Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business146 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware160 Questions
Exam 4: Computer Software139 Questions
Exam 5: Data Resource Management119 Questions
Exam 6: Telecommunications and Networks126 Questions
Exam 7: Electronic Business Systems112 Questions
Exam 8: Enterprise Business Systems105 Questions
Exam 9: Electronic Commerce Systems111 Questions
Exam 10: Decision Support Systems123 Questions
Exam 11: Developing Businessit Strategies125 Questions
Exam 12: Developing Businessit Solutions145 Questions
Exam 13: Security and Ethical Challenges119 Questions
Exam 14: Enterprise and Global Management of Information Technology124 Questions
Select questions type
A company may use computer systems that have redundant processors, peripherals, and software to obtain a ________________ capability, where the computer system continues to operate at the same level even if there is a major hardware or software failure.
(Short Answer)
4.8/5
(43)
The text refers to the unauthorized use of computer systems and networks. To attack this problem, companies can use ________________ to monitor network traffic in order to reveal evidence of improper use.
(Short Answer)
4.9/5
(39)
According to the text case, monitoring employees use of email and the Internet has become commonplace.
(True/False)
4.9/5
(34)
An effective disaster recovery plan would include which of the following?
(Multiple Choice)
4.9/5
(37)
Unauthorized copying of software (software piracy) is illegal because software is considered ________________ that is protected by copyright law and user licensing agreements.
(Short Answer)
4.8/5
(32)
Unauthorized copying of software, or ________________, is a major form of software theft.
(Short Answer)
5.0/5
(39)
Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.
(True/False)
4.8/5
(38)
All of the following are common ways for a computer virus to enter a computer system except:
(Multiple Choice)
4.8/5
(35)
Talking unsuspecting company employees out of valuable information such as passwords is called:
(Multiple Choice)
4.8/5
(37)
The ________________ virus arrives in the form of an e-mail attachment with a subject line that will read either "Re: Movied," "Re: Sample," "Re: Document," or "Re: Here is that sample," and it will appear to originate from big@boss.com.
(Short Answer)
4.8/5
(39)
In most cases, the purchase of a commercial software package is really a payment to license its fair use by an individual end user. Therefore, many companies sign ________________ licenses that allow them to legally make a certain number of copies for use by their employees at a particular location.
(Short Answer)
4.9/5
(36)
_______________ is/are the most commonly used security technology at large companies.
(Multiple Choice)
4.9/5
(37)
Confidential e-mail messages are seldom monitored, although other business communication routinely is.
(True/False)
4.8/5
(40)
According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:
(Multiple Choice)
4.7/5
(41)
According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.
(True/False)
4.7/5
(34)
Which of the following is a method used to defend against denial of service attacks at the victim's website?
(Multiple Choice)
4.9/5
(30)
According to the text case, ________________ of people have stolen key information from work.
(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)