Exam 10: Ethics, Privacy, and Security
Exam 1: Information Systems and People120 Questions
Exam 2: Information Systems and Strategy120 Questions
Exam 3: Information and Communications Technologies: The Enterprise Architecture120 Questions
Exam 4: Databases and Datawarehouses122 Questions
Exam 5: Information Systems for the Enterprise120 Questions
Exam 6: The Web, E-Commerce, and M-Commerce120 Questions
Exam 7: Business Intelligence and Decision Making120 Questions
Exam 8: Collaborating With Technology120 Questions
Exam 9: Knowledge Management and E-Learning120 Questions
Exam 10: Ethics, Privacy, and Security120 Questions
Exam 11: Systems Development and Procurement120 Questions
Exam 12: Project Management and Strategic Planning119 Questions
Select questions type
Biometric identifiers refer to something the user knows, such as a user ID, password, PIN, or answer to a security question.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
Which of the following is true of the European Union's Data Protection Directive?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
Which of the following is an accurate definition of a computer virus?
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
A
Which of the following technologies is most likely to be used by organizations as an authentication strategy?
(Multiple Choice)
4.8/5
(36)
Digital rights management offers IP holders the benefit of ________.
(Multiple Choice)
4.7/5
(48)
All ethical actions are legal, but not all legal actions are ethical.
(True/False)
5.0/5
(40)
What is the purpose of using surveillance technologies in organizations? How do they help in protecting information and monitoring productivity?
(Essay)
4.7/5
(27)
Discuss any two kinds of authentication strategies used in organizations.
(Essay)
4.8/5
(40)
Which of the following methods is often used for phishing purposes?
(Multiple Choice)
4.7/5
(33)
Which of the following is a provision of the State Security Breach Notification Laws?
(Multiple Choice)
4.9/5
(40)
What is the step involved in risk management after vulnerabilities of an organization have been examined?
(Multiple Choice)
4.8/5
(37)
Organizations use a(n)________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.
(Multiple Choice)
5.0/5
(27)
What are some of the key elements that a security awareness program should comprise?
(Essay)
4.8/5
(35)
When a person tries to judge what action would create the greatest good for the greatest number, he or she is using a utilitarian scheme.
(True/False)
4.8/5
(32)
Under which of the following circumstances is information privacy most difficult to achieve?
(Multiple Choice)
4.9/5
(29)
One way to identify a threat in an incident response plan is to ________.
(Multiple Choice)
4.8/5
(37)
Which of the following statements is true of information privacy?
(Multiple Choice)
4.8/5
(32)
________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
(Multiple Choice)
4.7/5
(37)
Showing 1 - 20 of 120
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)