Exam 12: Ethical, privacy, and Security Issues

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The overwhelming majority of successful computer attacks are made possible by taking advantage of little-known vulnerabilities.

(True/False)
5.0/5
(38)

A(n)____ works by using the Internet to relay communications,but maintains privacy through security procedures and tunneling protocols,which encrypt data at the sending end and decrypt it at the receiving end.

(Multiple Choice)
5.0/5
(38)

The ___________________ should provide guidance to help an organization recognize and deal with ethical issues,provide mechanisms for reporting unethical conduct,and foster a culture of honesty and accountability.

(Short Answer)
4.8/5
(32)

Viruses differ from worms in that they can propagate over a network without human intervention,sending copies of themselves to other computers by e-mail or Internet Relay Chat (IRC).

(True/False)
4.8/5
(29)

In most corporations,the ___________________ is responsible for monitoring network security Web sites frequently and downloading updated antivirus software as needed.

(Short Answer)
4.9/5
(27)

An organization should be prepared for the worst-a successful attack that defeats all or some of a system's defenses and damages data and information systems.

(True/False)
4.8/5
(48)

A(n)____________________ test entails assigning individuals to try to break through the measures and identify vulnerabilities that still need to be addressed.

(Short Answer)
4.9/5
(31)

The ethics officer tries to establish an environment that encourages ethical decision making.

(True/False)
4.8/5
(28)

A thorough ____ should test system safeguards to ensure that they are operating as intended.

(Multiple Choice)
4.7/5
(38)

List three potential costs of a security breach.

(Essay)
4.9/5
(31)

Making ethical decisions in the area of information technology is really no different than in other areas,although the specific issues may be different.

(True/False)
4.8/5
(32)

A ____ models normal behavior of a system and its users from reference information collected by various means.

(Multiple Choice)
5.0/5
(42)

Nearly everyone would agree that it is acceptable to tell a lie to protect someone's feelings or to keep a friend from getting into trouble.

(True/False)
4.8/5
(49)

A(n)_____________________ should be conducted after an incident to determine exactly what happened and to evaluate how the organization responded.

(Short Answer)
4.9/5
(38)

The ____ should define clearly the process for deciding if an attack is dangerous enough to warrant shutting down or disconnecting critical systems from the network.

(Multiple Choice)
4.8/5
(31)

List four tasks that are critical to establishing an effective data privacy program.

(Essay)
4.8/5
(46)

A well-developed ____________________ helps keep an incident under technical and emotional control.

(Short Answer)
4.9/5
(42)

A(n)____ defines an organization's security requirements as well as the controls and sanctions needed to meet those requirements.

(Multiple Choice)
4.8/5
(37)

A completed ____________________ identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff.

(Short Answer)
4.7/5
(41)

The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 70
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)