Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Where do organizations typically place firewalls?

(Multiple Choice)
4.9/5
(43)

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?

(Multiple Choice)
4.7/5
(29)

Organizations address security risks through two lines of defense.The first is people and the second is technology.

(True/False)
4.7/5
(40)

Which of the following is not considered a form of biometrics?

(Multiple Choice)
4.9/5
(35)

___________ refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.

(Short Answer)
4.9/5
(29)

What is an act or object that poses a danger to assets?

(Multiple Choice)
4.8/5
(37)

Information ___________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

(Short Answer)
4.9/5
(39)

The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.

(Short Answer)
4.8/5
(44)

Which of the following describes confidentiality?

(Multiple Choice)
4.8/5
(38)

Which company policy did Visa create the program 'Innovant' to handle?

(Multiple Choice)
4.9/5
(44)

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

(True/False)
4.8/5
(43)

____________ are the principles and standards that guide our behavior toward other people.

(Short Answer)
4.8/5
(35)

Which of the following changes its form as it propagates?

(Multiple Choice)
4.9/5
(36)

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

(Multiple Choice)
4.8/5
(46)

In the information technology world,which of the following are examples of ethical issues that a company may have to manage?

(Multiple Choice)
4.8/5
(38)

A zombie farm is a group of computers on which a hacker has planted zombie programs.

(True/False)
4.7/5
(33)

Pirated software is software that is manufactured to look like the real thing and sold as such.

(True/False)
5.0/5
(43)

Which of the following is an example of acting ethically?

(Multiple Choice)
4.8/5
(41)

Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.

(True/False)
4.8/5
(33)

Which of the following is not considered an epolicy?

(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)