Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?

(Multiple Choice)
4.7/5
(40)

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?

(Multiple Choice)
4.9/5
(38)

Which of the following is the correct list of the six different types of hackers listed in your text?

(Multiple Choice)
4.9/5
(36)

Backdoor programs change their form as they propagate.

(True/False)
4.7/5
(35)

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.

(Multiple Choice)
4.8/5
(40)

Describe the relationship between information security policies and an information security plan.

(Essay)
4.8/5
(44)

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

(True/False)
4.8/5
(37)

What is spear phishing?

(Multiple Choice)
4.9/5
(42)

Cybervandalism is the electronic defacing of an existing website.

(True/False)
4.8/5
(36)

___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

(Short Answer)
4.8/5
(39)

The most common type of defense within detection and response technologies is _________ software.

(Short Answer)
4.7/5
(43)

The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

(Short Answer)
4.8/5
(36)

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

(True/False)
4.9/5
(32)

What is the most secure type of authentication?

(Multiple Choice)
4.8/5
(36)

Which of the following describes privacy?

(Multiple Choice)
4.9/5
(35)

A smart card is a device,the size of a credit card that contains embedded technology that stores information and small amounts of software,and can act as __________________.

(Multiple Choice)
4.9/5
(39)

What is vishing?

(Multiple Choice)
4.7/5
(34)

As the President of a local trade company,Kristin is faced with leadership,ethical,and operational decisions on a daily basis.Kristin's responsibilities include examining the organizational resource of information and regulating its definitions,uses,value,and distribution ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?

(Multiple Choice)
4.9/5
(38)

Information ____________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(Short Answer)
4.9/5
(31)

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

(True/False)
4.8/5
(38)
Showing 321 - 340 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)