Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
(Short Answer)
4.8/5
(40)
Frozen pipe,bomb threat,epidemic,fire,or terrorism are all examples of unplanned __________.
(Short Answer)
4.7/5
(33)
A company should be able to calculate the cost of downtime by which of the following?
(Multiple Choice)
4.7/5
(28)
Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
(True/False)
4.9/5
(36)
According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.
(Multiple Choice)
4.8/5
(32)
Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.
(Short Answer)
4.9/5
(42)
Ethics and security are two fundamental building blocks for all organizations.
(True/False)
5.0/5
(33)
The___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.
(Short Answer)
4.8/5
(33)
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
(Multiple Choice)
4.8/5
(44)
Which of the below represents the definition of information compliance?
(Multiple Choice)
4.8/5
(42)
Tokens are small electronic devices that change user passwords automatically.
(True/False)
4.8/5
(32)
Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
(True/False)
4.8/5
(33)
Which policy details the extent to which email messages may be read by others?
(Multiple Choice)
4.8/5
(41)
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
(Multiple Choice)
4.9/5
(28)
What reroutes requests for legitimate websites to false website?
(Multiple Choice)
4.9/5
(41)
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.
(True/False)
5.0/5
(38)
What includes a variety of threats such as viruses,worms,and Trojan horses?
(Multiple Choice)
4.8/5
(35)
What is it called when a hacker looks through your trash to find personal information?
(Multiple Choice)
4.8/5
(34)
Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.
(True/False)
4.9/5
(33)
Showing 41 - 60 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)