Exam 12: Ethical, privacy, and Security Issues
Exam 1: Managers: Key to Information Technology Results60 Questions
Exam 2: Strategic Planning60 Questions
Exam 3: Project Management60 Questions
Exam 4: Business Processing and IT Outsourcing60 Questions
Exam 5: Corporate Governance and IT60 Questions
Exam 6: Collaboration Tools and Wireless Networks70 Questions
Exam 7: E-Business60 Questions
Exam 8: Enterprise Resource Planning60 Questions
Exam 9: Business Intelligence70 Questions
Exam 10: Knowledge Management70 Questions
Exam 11: Enterprise Architecture70 Questions
Exam 12: Ethical, privacy, and Security Issues70 Questions
Select questions type
Often a corporation will down play ethics policies following a major scandal within the organization.
Free
(True/False)
4.8/5
(40)
Correct Answer:
False
____ captures valuable evidence for a future prosecution and provides data to help during the incident eradication and follow-up phases.
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
B
The board of directors is responsible for the careful and responsible management of an organization.
Free
(True/False)
4.8/5
(29)
Correct Answer:
True
A(n)____ should be developed well in advance of any incident and be approved by both the organization's legal department and senior management.
(Multiple Choice)
4.9/5
(35)
Expert crackers can conceal their identity and tracking them down can take a long time as well as a tremendous amount of corporate resources.
(True/False)
4.9/5
(37)
A ____ stands guard between your organization's internal network and the Internet,and limits network access based on the organization's access policy.
(Multiple Choice)
4.9/5
(42)
____________________ is a set of beliefs about right and wrong behavior.
(Short Answer)
4.8/5
(45)
The _________________________ role includes "integrating their organization's ethics and values initiatives,compliance activities,and business conduct practices into the decision-making processes at all levels of the organization."
(Short Answer)
5.0/5
(43)
The ____ Amendment of the Constitution protects citizens from unreasonable searches by the government and is often used to protect the privacy of government employees.
(Multiple Choice)
5.0/5
(32)
___________________ is a broad class of cybercrime that involves the use of computer hardware,software,or networks to misrepresent facts for the purpose of causing someone to do or refrain from doing something that causes loss.
(Short Answer)
4.7/5
(38)
Creating a ____ of each compromised system on write-only media for later study,and as evidence,can be very useful.
(Multiple Choice)
4.9/5
(36)
Most firewalls are configured to allow e-mail and benign-looking attachments to reach their intended recipient.
(True/False)
4.9/5
(35)
All parties working on the problem need to be kept informed and up-to-date,even if it means using systems connected to the compromised system.
(True/False)
4.8/5
(36)
The presence of a corporate ethics officer has become increasingly common.
(True/False)
4.9/5
(36)
Because security incident documentation may become court evidence,an organization should establish a set of document handling procedures using the ____________________ department as a resource.
(Short Answer)
4.7/5
(37)
The ____ is a senior-level manager who provides vision and direction in the area of business conduct.
(Multiple Choice)
4.7/5
(38)
The key to security is to implement a(n)____________________ security solution to make computer break-ins so difficult that an attacker eventually gives up.
(Short Answer)
4.8/5
(33)
Employees are increasingly evaluated on their demonstration of qualities and characteristics that are highlighted in the corporate code of ethics.
(True/False)
4.8/5
(35)
Antivirus software scans for a specific sequence of bytes,known as a(n)____.
(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 70
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)