Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

(Short Answer)
4.8/5
(40)

Frozen pipe,bomb threat,epidemic,fire,or terrorism are all examples of unplanned __________.

(Short Answer)
4.7/5
(33)

A company should be able to calculate the cost of downtime by which of the following?

(Multiple Choice)
4.7/5
(28)

Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

(True/False)
4.9/5
(36)

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.

(Multiple Choice)
4.8/5
(32)

Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.

(Short Answer)
4.9/5
(42)

Ethics and security are two fundamental building blocks for all organizations.

(True/False)
5.0/5
(33)

The___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.

(Short Answer)
4.8/5
(33)

Which act protects investors by improving the accuracy and reliability of corporate disclosures?

(Multiple Choice)
4.8/5
(44)

Which of the below represents the definition of information compliance?

(Multiple Choice)
4.8/5
(42)

_______________ is a hacker with criminal intent.

(Short Answer)
4.8/5
(39)

Tokens are small electronic devices that change user passwords automatically.

(True/False)
4.8/5
(32)

Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.

(True/False)
4.8/5
(33)

Which policy details the extent to which email messages may be read by others?

(Multiple Choice)
4.8/5
(41)

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

(Multiple Choice)
4.9/5
(28)

What reroutes requests for legitimate websites to false website?

(Multiple Choice)
4.9/5
(41)

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

(True/False)
5.0/5
(38)

What includes a variety of threats such as viruses,worms,and Trojan horses?

(Multiple Choice)
4.8/5
(35)

What is it called when a hacker looks through your trash to find personal information?

(Multiple Choice)
4.8/5
(34)

Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.

(True/False)
4.9/5
(33)
Showing 41 - 60 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)