Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?
(Multiple Choice)
4.7/5
(44)
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
(True/False)
4.9/5
(34)
Information security policies detail how an organization will implement the information security plan.
(True/False)
4.8/5
(45)
What is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents?
(Multiple Choice)
4.8/5
(29)
What is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?
(Multiple Choice)
4.8/5
(35)
Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.
(True/False)
4.8/5
(41)
What is software written with malicious intent to cause annoyance or damage?
(Multiple Choice)
4.9/5
(39)
If an organization implemented only one policy,which one would it want to implement?
(Multiple Choice)
4.9/5
(37)
A social media policy outlines the corporate guidelines or principles governing employee online communications.
(True/False)
4.9/5
(33)
What is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them?
(Multiple Choice)
4.9/5
(40)
What is a masquerading attack that combines spam with spoofing?
(Multiple Choice)
4.8/5
(37)
What must you do with antivirus software to make it protect effectively?
(Multiple Choice)
4.7/5
(40)
Which of the following refers to a period of time when a system is unavailable?
(Multiple Choice)
4.8/5
(46)
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
(True/False)
4.8/5
(40)
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers,resolving customer issues,and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?
(Multiple Choice)
4.9/5
(39)
What is one of the guidelines an organization can follow when creating an information privacy policy?
(Multiple Choice)
4.9/5
(34)
What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?
(Multiple Choice)
4.9/5
(41)
Within the third area of detection and response,an __________ detection software features full-time monitoring tools that search for patterns in network traffic to identify intruders.
(Short Answer)
4.9/5
(30)
Showing 101 - 120 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)