Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What scrambles information into an alternative form that requires a key or password to decrypt?

(Multiple Choice)
4.8/5
(37)

Which of the following is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?

(Multiple Choice)
4.8/5
(46)

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

(Multiple Choice)
4.9/5
(39)

In relation to privacy,which of the following is the assurance that messages and information remain available only to those authorized to view them?

(Multiple Choice)
4.8/5
(36)

What is pharming?

(Multiple Choice)
4.8/5
(44)

With so much information and moving parts within a company,technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employee's activities by measures as keystrokes,error rate,and number of transaction processed?

(Multiple Choice)
4.8/5
(35)

What is digital rights management?

(Multiple Choice)
4.9/5
(35)

Which of the following authentication methods is 100 percent accurate?

(Multiple Choice)
4.7/5
(35)

The most secure procedures combine which of the following authentication and authorization techniques?

(Multiple Choice)
4.7/5
(30)

Included in the information security policy,managers should consider including virus protection,which includes how often the system should be scanned and how frequently the software should be __________.

(Short Answer)
4.9/5
(27)

What is a process by which a user misleads a system into granting unauthorized rights,usually for the purpose of compromising or destroying the system?

(Multiple Choice)
4.9/5
(41)

Script-kiddies have criminal intent when hacking.

(True/False)
4.9/5
(44)

Which of the following represents the two fundamental building blocks that protect organizational information?

(Multiple Choice)
4.8/5
(37)

Crackers,cyberterrorists,hactivists,and script bunnies are all types of __________.

(Short Answer)
4.7/5
(32)

Which of the following are all common forms of viruses?

(Multiple Choice)
4.9/5
(34)

Identity theft is the forging of someone's identity for the purpose of fraud.

(True/False)
4.8/5
(37)

What is a threat?

(Multiple Choice)
4.8/5
(39)

A DDoS stands for one of the common forms of viruses,that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?

(Multiple Choice)
4.9/5
(35)

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames,passwords,personal information,and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names.This is a classic example of which of the following security breaches?

(Multiple Choice)
4.9/5
(40)

__________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

(Short Answer)
4.8/5
(42)
Showing 301 - 320 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)