Exam 4: Ethics and Information Security: Mis Business Concerns
Exam 1: Management Information Systems: Business Driven MIS315 Questions
Exam 2: Decisions and Processes: Value Driven Business331 Questions
Exam 3: Ebusiness: Electronic Business Value385 Questions
Exam 4: Ethics and Information Security: Mis Business Concerns344 Questions
Exam 5: Infrastructures: Sustainable Technologies252 Questions
Exam 6: Data: Business Intelligence286 Questions
Exam 7: Networks: Mobile Business268 Questions
Exam 8: Enterprise Applications: Business Communications241 Questions
Exam 9: Systems Development and Project Management: Corporate Responsibility293 Questions
Exam 10: Hardware and Software Basics212 Questions
Exam 11: Networks and Telecommunications109 Questions
Exam 12: Designing Databases32 Questions
Select questions type
Which of the following is considered a type of biometrics?
(Multiple Choice)
4.8/5
(35)
Which of the following policies details the extent to which email messages may be read by others?
(Multiple Choice)
4.9/5
(34)
Trust between companies,customers,partners,and suppliers are the support structure of which of the following?
(Multiple Choice)
4.7/5
(37)
Which of the below is a common Internet monitoring technology?
(Multiple Choice)
4.8/5
(38)
What reroutes requests for legitimate websites to false websites?
(Multiple Choice)
4.9/5
(40)
Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?
(Multiple Choice)
4.9/5
(47)
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
(Short Answer)
4.9/5
(37)
_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
(Short Answer)
4.8/5
(33)
Which policy contains general principles regarding information privacy?
(Multiple Choice)
4.9/5
(30)
Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
(True/False)
4.8/5
(39)
______________ property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.
(Short Answer)
4.9/5
(33)
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
(Multiple Choice)
4.9/5
(44)
What is the difference between pirated and counterfeit software?
(Multiple Choice)
4.7/5
(33)
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
(Multiple Choice)
4.9/5
(42)
Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.
(True/False)
4.8/5
(39)
Information security ___________ identify the rules required to maintain information security,such as requiring users to log off before leaving for lunch or meetings,never sharing passwords with anyone,and changing passwords every thirty days.
(Short Answer)
4.8/5
(37)
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
(Multiple Choice)
4.9/5
(39)
What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?
(Multiple Choice)
4.9/5
(41)
A(n)_________ is software written with malicious intent to cause annoyance or damage.
(Short Answer)
5.0/5
(44)
Showing 161 - 180 of 344
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)