Exam 12: Regulating and Managing Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Creating and distributing viruses on other computers is called hacking.

(True/False)
4.9/5
(34)

Why is the management and regulation of information technology a challenge for governments and businesses? What are some advantages of the two entities working together?

(Short Answer)
4.8/5
(35)

How is the corporate Chief Information Officer (CIO)a "security guard" for the organization? What are some of the important responsibilities of the CIO?

(Essay)
4.8/5
(26)

Discuss the global impact of cybercrime and explain how some international and national groups are fighting it.

(Essay)
5.0/5
(40)

The primary reason that hackers hack is to make money.

(True/False)
5.0/5
(30)

These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:

(Multiple Choice)
4.9/5
(32)

The U.S.government strictly controls the use of GPS and similar tracking devices at the federal level.

(True/False)
5.0/5
(37)

This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

(Multiple Choice)
4.8/5
(30)

Which of these statements is (are)true about the group known as Anonymous?

(Multiple Choice)
4.8/5
(32)

Software piracy is a major problem in which part of the world?

(Multiple Choice)
4.9/5
(30)

Which website received a favorable review because they limited the ability of hackers to take advantage of one another?

(Multiple Choice)
4.8/5
(32)

The U.S.PRISM program was designed primarily to protect public privacy.

(True/False)
4.9/5
(29)

Many authoritarian governments have expanded Internet censorship in recent years.

(True/False)
4.8/5
(47)

Which country recently required all video-streaming sites to be approved by the government or risk having their content banned?

(Multiple Choice)
4.9/5
(27)

In 2014,a Ponemon Institute study reported that businesses took an average of 60 days to recover from a cyberattack.

(True/False)
4.9/5
(28)

The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.

(True/False)
4.8/5
(27)

Intellectual property refers to:

(Multiple Choice)
4.7/5
(33)

Which of these statements accurately describe hacktivists known as grey hatters?

(Multiple Choice)
4.8/5
(32)

The purpose of the right to be forgotten is to:

(Multiple Choice)
4.8/5
(38)

Hackers who intend to profit from their actions are motived by:

(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)