Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

___________ is a method for confirming users' identities.

(Short Answer)
4.9/5
(32)

What is a phishing expedition?

(Multiple Choice)
4.8/5
(36)

Who are hackers with criminal intent?

(Multiple Choice)
4.8/5
(38)

eBay is an example of an online company that has been faced with numerous security issues.For example,imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course,this email is not actually from eBay and as soon as you log in your information will be stolen.What type of information security breach would you consider this to be?

(Multiple Choice)
4.8/5
(32)

_________ seeks to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

(Short Answer)
4.8/5
(41)

What occurs when a person chooses to deny permission to incoming emails?

(Multiple Choice)
4.7/5
(42)

An information security ___________ details how an organization will implement the information security policies.

(Short Answer)
4.8/5
(33)

What are computer viruses that wait for a specific date before executing their instructions?

(Multiple Choice)
4.9/5
(34)

Sophie Black works as a computer programmer for a software company.Her boss,Mike Jones,is responsible for developing a new software game for the Wii.After completion of the project Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

(Multiple Choice)
4.8/5
(36)

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

(True/False)
4.9/5
(43)

A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.

(Short Answer)
4.7/5
(39)

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?

(Multiple Choice)
4.8/5
(34)

The six epolicies organizations should implement include,ethical computer use policy,information privacy policy,acceptable use policy,email privacy policy,__________ media policy,and workplace monitoring policy.

(Short Answer)
4.8/5
(39)

Information governance is a method or system of government for information management or control.

(True/False)
4.9/5
(28)

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

(True/False)
4.8/5
(35)

What decodes information?

(Multiple Choice)
4.7/5
(36)

There are three areas where technology can aid in the defense against attacks.Area one which is at the people level includes authentication and _____________________.

(Short Answer)
4.8/5
(32)

The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.

(True/False)
4.9/5
(33)

Worms are computer viruses that wait for a specific date before executing their instructions.

(True/False)
4.9/5
(39)

Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

(True/False)
4.9/5
(44)
Showing 141 - 160 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)