Exam 10: Ethics, Privacy, and Security
Exam 1: Information Systems and People113 Questions
Exam 11: Systems Development and Procurement117 Questions
Exam 12: Project Management and Strategic Planning120 Questions
Exam 2: Information Systems and Strategy111 Questions
Exam 3: Information and Communications Technologies: The Enterprise Architecture115 Questions
Exam 4: Managing Information Resources with Databases117 Questions
Exam 5: Information Systems for the Enterprise112 Questions
Exam 6: The Web and E-Commerce114 Questions
Exam 10: Ethics, Privacy, and Security120 Questions
Exam 7: Business Intelligence and Decision Support119 Questions
Exam 8: Collaborating with Technology114 Questions
Exam 9: Knowledge Management and E-Learning120 Questions
Select questions type
________ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
C
What is the purpose of using surveillance in organizations? How do they help in protecting information and monitoring productivity?
Free
(Essay)
4.8/5
(29)
Correct Answer:
Surveillance technologies to monitor e-mail, web surfing, and other online communications are readily available to all organizations. These techniques are used for a range of purposes like employer liability for allowing harassment or hostile work environments, the need to protect security and confidentiality, employee productivity, and concerns about bogging down corporate e-mail systems with personal e-mail. Security concerns about trade secrets also prompt employers to keep tabs on communications. Employers sometimes also step up surveillance on employees who will soon be gone due to layoffs or firings and who might decide to take confidential customer lists or other proprietary information with them.
Botnets are computers configured with specific vulnerabilities so they can attract different varieties
of malware in the wild, study their properties, and eradicate them.
Free
(True/False)
4.8/5
(27)
Correct Answer:
False
What are some of the key elements that a security awareness program should consist of?
(Essay)
4.8/5
(36)
The incidence response plan is used by organizational staff to categorize threats, determine the cause, preserve evidence, and get the systems back online.
(True/False)
4.9/5
(28)
A drawback of using proxy servers for online anonymity is the need to rely on the company that operates the proxy servers and its promise to protect its customers' identities.
(True/False)
5.0/5
(31)
Discuss social engineering and explain why humans are soft targets for social engineers.
(Essay)
4.8/5
(33)
Honeypots are human-made threats that barrage servers and computers every day with automated attempts to install all types of malware.
(True/False)
4.7/5
(40)
For which of the following purposes are botnets most likely to be used?
(Multiple Choice)
4.7/5
(28)
A cognitive obstacle for strong passwords is the capacity of human memory.
(True/False)
4.8/5
(33)
Which of the following methods is often used for phishing purposes?
(Multiple Choice)
4.8/5
(41)
Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information?
(Multiple Choice)
4.9/5
(33)
The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to the computer, as for a botnet.
(Multiple Choice)
4.8/5
(35)
________ is one way of recovering systems in an incidence response plan.
(Multiple Choice)
4.9/5
(33)
What does the Family Educational Rights and Privacy Act stipulate?
(Multiple Choice)
4.9/5
(36)
Organizations use a(n) ________ to categorize a security threat, determine the cause, preserve any evidence, and get systems back online so that the organization can resume business.
(Multiple Choice)
4.8/5
(25)
Using fake names, nicknames, free e-mail, and public computers ensures that one is perfectly anonymous on the Internet.
(True/False)
4.8/5
(41)
The term ________ refers to software that monitors a user's activity on the computer and on the Internet, often installed without the user's knowledge.
(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 120
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)