Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following are all common forms of viruses?

(Multiple Choice)
4.8/5
(29)

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

(Multiple Choice)
4.9/5
(34)

Who are hackers with criminal intent?

(Multiple Choice)
4.8/5
(39)

Information governance is a method or system of government for information management or control.

(True/False)
4.9/5
(36)

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

(True/False)
4.8/5
(29)

What is a hacker?

(Multiple Choice)
4.7/5
(50)

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?

(Multiple Choice)
4.9/5
(38)

What is pirated software?

(Multiple Choice)
4.8/5
(31)

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

(Multiple Choice)
4.8/5
(32)

Which of the following is an example of acting ethically?

(Multiple Choice)
4.8/5
(36)

Describe the relationships and differences between hackers and viruses.

(Essay)
4.9/5
(36)

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

(Multiple Choice)
4.8/5
(35)

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

(Multiple Choice)
4.8/5
(42)

What was passed to protect minors from accessing inappropriate material on the Internet?

(Multiple Choice)
4.9/5
(50)

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

(Multiple Choice)
4.9/5
(46)

A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

(True/False)
4.7/5
(31)

Which of the following represents the two fundamental building blocks that protect organizational information?

(Multiple Choice)
4.8/5
(35)

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?

(Multiple Choice)
4.9/5
(44)

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?

(Multiple Choice)
4.8/5
(42)

Which of the following is a cost of downtime in addition to lost revenue?

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)