Exam 10: Ethics, Privacy, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Biometric identifiers refer to something the user knows, such as a user ID, password, PIN, or answer to a security question.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

Which of the following is true of the European Union's Data Protection Directive?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

Which of the following is an accurate definition of a computer virus?

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

A

Which of the following technologies is most likely to be used by organizations as an authentication strategy?

(Multiple Choice)
4.8/5
(36)

When does a computer become a zombie?

(Multiple Choice)
4.8/5
(35)

Digital rights management offers IP holders the benefit of ________.

(Multiple Choice)
4.7/5
(48)

All ethical actions are legal, but not all legal actions are ethical.

(True/False)
5.0/5
(40)

What is the purpose of using surveillance technologies in organizations? How do they help in protecting information and monitoring productivity?

(Essay)
4.7/5
(27)

Discuss any two kinds of authentication strategies used in organizations.

(Essay)
4.8/5
(40)

Which of the following methods is often used for phishing purposes?

(Multiple Choice)
4.7/5
(33)

Which of the following is a provision of the State Security Breach Notification Laws?

(Multiple Choice)
4.9/5
(40)

Which of the following systems are used to combat spam?

(Multiple Choice)
4.9/5
(42)

What is the step involved in risk management after vulnerabilities of an organization have been examined?

(Multiple Choice)
4.8/5
(37)

Organizations use a(n)________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.

(Multiple Choice)
5.0/5
(27)

What are some of the key elements that a security awareness program should comprise?

(Essay)
4.8/5
(35)

When a person tries to judge what action would create the greatest good for the greatest number, he or she is using a utilitarian scheme.

(True/False)
4.8/5
(32)

Under which of the following circumstances is information privacy most difficult to achieve?

(Multiple Choice)
4.9/5
(29)

One way to identify a threat in an incident response plan is to ________.

(Multiple Choice)
4.8/5
(37)

Which of the following statements is true of information privacy?

(Multiple Choice)
4.8/5
(32)

________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

(Multiple Choice)
4.7/5
(37)
Showing 1 - 20 of 120
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)