Exam 4: Ethics and Information Security: Mis Business Concerns

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is considered a type of biometrics?

(Multiple Choice)
4.8/5
(35)

Which of the following policies details the extent to which email messages may be read by others?

(Multiple Choice)
4.9/5
(34)

Trust between companies,customers,partners,and suppliers are the support structure of which of the following?

(Multiple Choice)
4.7/5
(37)

Which of the below is a common Internet monitoring technology?

(Multiple Choice)
4.8/5
(38)

What reroutes requests for legitimate websites to false websites?

(Multiple Choice)
4.9/5
(40)

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?

(Multiple Choice)
4.9/5
(47)

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

(Short Answer)
4.9/5
(37)

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

(Short Answer)
4.8/5
(33)

Which policy contains general principles regarding information privacy?

(Multiple Choice)
4.9/5
(30)

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

(True/False)
4.8/5
(39)

______________ property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

(Short Answer)
4.9/5
(33)

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

(Multiple Choice)
4.9/5
(44)

What is the difference between pirated and counterfeit software?

(Multiple Choice)
4.7/5
(33)

Which of the following key terms represents the principles and standards that guide our behavior toward other people?

(Multiple Choice)
4.9/5
(42)

Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.

(True/False)
4.8/5
(39)

Which of the following definitions represents opt-out?

(Multiple Choice)
4.9/5
(42)

Information security ___________ identify the rules required to maintain information security,such as requiring users to log off before leaving for lunch or meetings,never sharing passwords with anyone,and changing passwords every thirty days.

(Short Answer)
4.8/5
(37)

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

(Multiple Choice)
4.9/5
(39)

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?

(Multiple Choice)
4.9/5
(41)

A(n)_________ is software written with malicious intent to cause annoyance or damage.

(Short Answer)
5.0/5
(44)
Showing 161 - 180 of 344
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)