Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is spyware?

Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
Verified

D

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

C

What is simplelocker?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

A DDoS stands for one of the common forms of viruses that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?

(Multiple Choice)
4.9/5
(40)

Describe the relationship between ethics and privacy.

(Essay)
4.8/5
(32)

Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.

(True/False)
4.8/5
(39)

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

(True/False)
4.8/5
(21)

Which of the following describes confidentiality?

(Multiple Choice)
4.7/5
(27)

What is the method or system of government for information management or control?

(Multiple Choice)
4.8/5
(38)

What is ediscovery?

(Multiple Choice)
4.8/5
(34)

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

(True/False)
4.9/5
(32)

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(True/False)
4.8/5
(34)

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

(True/False)
4.8/5
(32)

Trust between companies, customers, partners, and suppliers is the support structure of which of the following?

(Multiple Choice)
4.9/5
(35)

Which of the following represents the definition of information property?

(Multiple Choice)
4.7/5
(38)

Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

(True/False)
4.7/5
(41)

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?

(Multiple Choice)
4.7/5
(26)

Worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

(True/False)
4.9/5
(36)

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

(True/False)
4.8/5
(42)

Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)