Exam 13: Security and Ethical Challenges

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to the text, backup files:

(Multiple Choice)
4.9/5
(34)

Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.

(Multiple Choice)
4.8/5
(34)

Moonlighting is an Internet abuse where an employee is paid by outsiders for allowing them to use the company's Internet services for free.

(True/False)
4.7/5
(35)

________________ is a special class of adware that collects specific information about you, ranging from general demographics to credit card and social security numbers, using the user's Internet connection in the background without his/her knowledge or explicit permission.

(Short Answer)
4.8/5
(41)

The text describes ________________ as the indiscriminate sending of unsolicited e-mail messages to many Internet users.

(Short Answer)
4.7/5
(32)

All of the following are AITP standards of professional conduct related to a person's obligation to society except:

(Multiple Choice)
4.8/5
(43)

Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.

(Multiple Choice)
4.7/5
(33)

Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems because of their faster download speeds.

(True/False)
4.9/5
(36)

Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.

(True/False)
4.8/5
(27)

According to the text, which are the four basic categories of ethical business issues where information technology has caused ethical controversy?

(Multiple Choice)
4.9/5
(36)

The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems.

(Multiple Choice)
4.8/5
(30)

According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.

(Multiple Choice)
4.8/5
(40)

Sifting through a company's garbage looking for information to help break into the company's computers; sometimes used in conjunction with social engineering is called:

(Multiple Choice)
4.8/5
(32)

Computer monitoring has been criticized as unethical because:

(Multiple Choice)
4.9/5
(33)

According to the text case, __________ of people have stolen key information from work.

(Short Answer)
4.7/5
(30)

Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:

(Multiple Choice)
4.9/5
(51)

When managers apply the _____________ theory of ethical decision making, they believe that companies have ethical responsibilities to all members of society.

(Multiple Choice)
5.0/5
(38)

Using office resources, such as networks and computers, to search for side jobs is generally not considered workplace Internet abuse.

(True/False)
4.8/5
(43)

Information technologies have caused a significant reduction in the following types of job opportunities, except:

(Multiple Choice)
4.9/5
(29)

According to the text, all the following are examples of ethical behavior by organizations, except:

(Multiple Choice)
4.9/5
(39)
Showing 61 - 80 of 119
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)