Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business146 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware160 Questions
Exam 4: Computer Software139 Questions
Exam 5: Data Resource Management119 Questions
Exam 6: Telecommunications and Networks126 Questions
Exam 7: Electronic Business Systems112 Questions
Exam 8: Enterprise Business Systems105 Questions
Exam 9: Electronic Commerce Systems111 Questions
Exam 10: Decision Support Systems123 Questions
Exam 11: Developing Businessit Strategies125 Questions
Exam 12: Developing Businessit Solutions145 Questions
Exam 13: Security and Ethical Challenges119 Questions
Exam 14: Enterprise and Global Management of Information Technology124 Questions
Select questions type
Firewall software has become essential for individuals connecting to the Internet with DSL or cable modems:
(Multiple Choice)
4.7/5
(39)
Which of the following statements about adware and spyware is true?
(Multiple Choice)
4.9/5
(31)
A hacker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds for private advantage, and does not reveal them either to the general public or to the manufacturer for correction.
(True/False)
4.9/5
(34)
People who sit at PC workstations or visual display terminals in fast-paced, repetitive-keystroke jobs can suffer from a variety of health problems, known collectively as _______________.
(Multiple Choice)
5.0/5
(41)
Which of the following is not a health issue commonly related to the use of information technology in the workplace?
(Multiple Choice)
4.9/5
(37)
In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.
(True/False)
4.8/5
(38)
According to the Real World case, CIOs should look at _______________ as a supplemental tool to limit communication of sensitive data.
(Multiple Choice)
4.7/5
(36)
Many computer crimes involve the theft of money. In the majority of these cases they are ________________ that involve unauthorized network entry and fraudulent alteration of computer database to cover the tracks of the employees involved.
(Short Answer)
4.7/5
(36)
According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.
(True/False)
4.7/5
(36)
In 2000, hackers broke into hundreds of servers and planted Trojan horse .exe programs, which were then used to launch a barrage of service requests in a concerted attack at e-commerce websites, such as Yahoo! and eBay. This is an example of a distributed ________________ attack.
(Multiple Choice)
4.9/5
(41)
Computer monitoring has been criticized as an invasion of employee privacy because:
(Multiple Choice)
4.9/5
(37)
________________ file sharing software enables direct MP3 audio file transfers of specified tracks of music between your PC and those of other users on the Internet.
(Short Answer)
4.7/5
(44)
According to the text, all of the following statements are included in the definition of computer crime except:
(Multiple Choice)
4.9/5
(41)
A ________________ plan is a method for ensuring that an organization recovers from natural and human-caused disasters that affect its computer-based operations. These plans specify items such as hardware, software, employee duties, and facilities to be used.
(Short Answer)
4.8/5
(41)
________________ is software that, while purporting to serve some useful function, also allows Internet advertisers to display advertisements as banners and pop-up ads without the consent of the computer user.
(Short Answer)
4.8/5
(41)
Showing 101 - 119 of 119
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)