Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

(Multiple Choice)
4.8/5
(35)

Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.

(True/False)
4.8/5
(33)

A worm is a form of malicious software that infects your computer and asks for money.

(True/False)
4.9/5
(25)

Which of the following represents the definition of information compliance?

(Multiple Choice)
4.9/5
(37)

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?

(Multiple Choice)
4.9/5
(43)

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

(True/False)
4.8/5
(41)

What is adware?

(Multiple Choice)
4.8/5
(39)

A company should be able to calculate the cost of downtime by which of the following?

(Multiple Choice)
4.8/5
(25)

Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

(True/False)
4.7/5
(40)

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___________.

(Multiple Choice)
4.9/5
(40)

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

(True/False)
4.7/5
(38)

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

(True/False)
4.8/5
(36)

Ethics and security are two fundamental building blocks for all organizations.

(True/False)
4.8/5
(34)

What is intangible creative work that is embodied in physical form and includes trademarks and patents?

(Multiple Choice)
4.9/5
(41)

Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.

(True/False)
5.0/5
(43)

Pirated software is software that is manufactured to look like the real thing and sold as such.

(True/False)
4.8/5
(34)

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

(True/False)
4.8/5
(32)

What is software written with malicious intent to cause annoyance or damage?

(Multiple Choice)
4.8/5
(41)

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

(True/False)
4.8/5
(32)

Backdoor programs open a way into the network for future attacks.

(True/False)
4.8/5
(38)
Showing 81 - 100 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)