Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A company may use computer systems that have redundant processors, peripherals, and software to obtain a ________________ capability, where the computer system continues to operate at the same level even if there is a major hardware or software failure.

(Short Answer)
4.8/5
(43)

The text refers to the unauthorized use of computer systems and networks. To attack this problem, companies can use ________________ to monitor network traffic in order to reveal evidence of improper use.

(Short Answer)
4.9/5
(39)

According to the text case, monitoring employees use of email and the Internet has become commonplace.

(True/False)
4.9/5
(34)

An effective disaster recovery plan would include which of the following?

(Multiple Choice)
4.9/5
(37)

The stockholder theory maintains that:

(Multiple Choice)
4.9/5
(36)

Unauthorized copying of software (software piracy) is illegal because software is considered ________________ that is protected by copyright law and user licensing agreements.

(Short Answer)
4.8/5
(32)

Unauthorized copying of software, or ________________, is a major form of software theft.

(Short Answer)
5.0/5
(39)

Computer monitoring has been criticized as an invasion of employee privacy because it uses video as well as keystroke surveillance.

(True/False)
4.8/5
(38)

All of the following are common ways for a computer virus to enter a computer system except:

(Multiple Choice)
4.8/5
(35)

Lawsuits by monitored workers against employers are increasing.

(True/False)
4.9/5
(28)

Talking unsuspecting company employees out of valuable information such as passwords is called:

(Multiple Choice)
4.8/5
(37)

The ________________ virus arrives in the form of an e-mail attachment with a subject line that will read either "Re: Movied," "Re: Sample," "Re: Document," or "Re: Here is that sample," and it will appear to originate from big@boss.com.

(Short Answer)
4.8/5
(39)

In most cases, the purchase of a commercial software package is really a payment to license its fair use by an individual end user. Therefore, many companies sign ________________ licenses that allow them to legally make a certain number of copies for use by their employees at a particular location.

(Short Answer)
4.9/5
(36)

_______________ is/are the most commonly used security technology at large companies.

(Multiple Choice)
4.9/5
(37)

Confidential e-mail messages are seldom monitored, although other business communication routinely is.

(True/False)
4.8/5
(40)

According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:

(Multiple Choice)
4.7/5
(41)

According to the text, the need for security management is being driven by the increasing threat of cybercrimes and by the growing use of the Internet to link companies with partners and customers.

(True/False)
4.7/5
(34)

Software that is not copyrighted is called:

(Multiple Choice)
4.9/5
(40)

Which of the following is a method used to defend against denial of service attacks at the victim's website?

(Multiple Choice)
4.9/5
(30)

According to the text case, ________________ of people have stolen key information from work.

(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)