Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

(Multiple Choice)
4.9/5
(36)

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

(Multiple Choice)
4.8/5
(44)

Which of the following represents the definition of information governance?

(Multiple Choice)
4.7/5
(43)

Which of the following changes its form as it propagates?

(Multiple Choice)
5.0/5
(30)

Which of the below represents the definition of information compliance?

(Multiple Choice)
4.9/5
(35)

What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?

(Multiple Choice)
4.9/5
(34)

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

(True/False)
4.7/5
(32)

Which of the following describes privacy?

(Multiple Choice)
4.9/5
(38)

What is spyware?

(Multiple Choice)
4.9/5
(36)

What includes a variety of threats such as viruses, worms, and Trojan horses?

(Multiple Choice)
4.8/5
(41)

Which of the following is the correct list of the six different types of hackers listed in your text?

(Multiple Choice)
4.8/5
(28)

What is ransomware?

(Multiple Choice)
4.8/5
(45)

What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?

(Multiple Choice)
5.0/5
(38)

Which category of the cost of downtime includes equipment rental, overtime costs, and travel expenses?

(Multiple Choice)
4.9/5
(39)

Explain the ethical issues in the use of information technology.

(Essay)
4.8/5
(43)

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

(True/False)
5.0/5
(40)

Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?

(Multiple Choice)
4.7/5
(29)

Which of the following defines information security?

(Multiple Choice)
4.9/5
(34)

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?

(Multiple Choice)
4.8/5
(35)

Which of the below represents the definition of information secrecy?

(Multiple Choice)
4.8/5
(28)
Showing 61 - 80 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)