Exam 12: Regulating and Managing Information Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called:

(Multiple Choice)
4.9/5
(36)

Explain the concept of the "right to be forgotten." What are its implications to governments,businesses and individuals?

(Essay)
4.8/5
(35)

In 2014,NATO ratified a change to its mission of collective defense by stating that a cyberattack on one member nation would be declared an attack on all members.

(True/False)
4.9/5
(28)

Electronic medical records are guaranteed to be 100 percent accurate.

(True/False)
4.9/5
(30)

Bill Joy,Sun Microsystems' chief scientist,warned that the rapid advances of technology:

(Multiple Choice)
4.8/5
(23)

Which of the following is not a role of the CIO?

(Multiple Choice)
4.9/5
(46)

Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks?

(Multiple Choice)
4.8/5
(42)

Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to?

(Multiple Choice)
4.9/5
(30)

Researchers for McKinsey & Company along with the World Economic Forum found that many firms struggled to manage the issues of cybercrime.

(True/False)
4.8/5
(34)

Governments and businesses understand each other's needs and cooperate fully to manage the benefits and threats of newly introduced technology.

(True/False)
4.8/5
(33)

Over time the role of the CIO:

(Multiple Choice)
4.8/5
(34)

Increased cyber activity by which country prompted NATO officials to brand them as "patriotic hackers"?

(Multiple Choice)
4.9/5
(36)
Showing 41 - 52 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)