Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?

(Multiple Choice)
4.7/5
(44)

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

(True/False)
4.9/5
(34)

Information security policies detail how an organization will implement the information security plan.

(True/False)
4.8/5
(45)

What is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents?

(Multiple Choice)
4.8/5
(29)

What is adware?

(Multiple Choice)
4.9/5
(43)

What is the electronic defacing of an existing website?

(Multiple Choice)
4.7/5
(34)

What is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?

(Multiple Choice)
4.8/5
(35)

Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.

(True/False)
4.8/5
(41)

What is software written with malicious intent to cause annoyance or damage?

(Multiple Choice)
4.9/5
(39)

If an organization implemented only one policy,which one would it want to implement?

(Multiple Choice)
4.9/5
(37)

A social media policy outlines the corporate guidelines or principles governing employee online communications.

(True/False)
4.9/5
(33)

What is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them?

(Multiple Choice)
4.9/5
(40)

What is a masquerading attack that combines spam with spoofing?

(Multiple Choice)
4.8/5
(37)

What must you do with antivirus software to make it protect effectively?

(Multiple Choice)
4.7/5
(40)

Which of the following refers to a period of time when a system is unavailable?

(Multiple Choice)
4.8/5
(46)

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

(True/False)
4.8/5
(40)

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers,resolving customer issues,and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?

(Multiple Choice)
4.9/5
(39)

What is one of the guidelines an organization can follow when creating an information privacy policy?

(Multiple Choice)
4.9/5
(34)

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?

(Multiple Choice)
4.9/5
(41)

Within the third area of detection and response,an __________ detection software features full-time monitoring tools that search for patterns in network traffic to identify intruders.

(Short Answer)
4.9/5
(30)
Showing 101 - 120 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)