Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Identify the six epolicies organizations should implement to protect themselves.

(Essay)
4.9/5
(40)

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?

(Multiple Choice)
4.9/5
(35)

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?

(Multiple Choice)
4.9/5
(41)

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

(True/False)
4.9/5
(41)

What is pirated software?

(Multiple Choice)
4.9/5
(36)

What is the legal protection afforded an expression of an idea,such as a song,book,or video game?

(Multiple Choice)
4.8/5
(35)

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

(Short Answer)
4.9/5
(42)

A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.

(True/False)
4.9/5
(26)

Which of the following is served as key evidence in many legal cases today and also provides a faster,easier way to search and organize paper documents?

(Multiple Choice)
4.8/5
(33)

What is ediscovery?

(Multiple Choice)
4.8/5
(37)

What is competitive click-fraud?

(Multiple Choice)
4.8/5
(36)

Charles Mott works for a company called VeriSign that acts as a trusted third party to verify information.One of Charles' largest clients is CheckMd,which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMD?

(Multiple Choice)
4.8/5
(40)

What is software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user?

(Multiple Choice)
4.9/5
(34)

Internet ____________ is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.

(Short Answer)
4.9/5
(31)

Which of the below should be included in a company email privacy policy?

(Multiple Choice)
4.8/5
(40)

An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.

(True/False)
4.9/5
(35)

Which of the below defines information security?

(Multiple Choice)
4.9/5
(43)

What is forging of someone's identity for the purpose of fraud?

(Multiple Choice)
4.9/5
(47)

Content ____________ occurs when organizations use software that filters content,such as emails,to prevent the accidental or malicious transmission of unauthorized information.

(Short Answer)
4.9/5
(31)

__________ is the electronic defacing of an existing website.

(Short Answer)
4.7/5
(38)
Showing 81 - 100 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)