Exam 12: Ethical, privacy, and Security Issues
Exam 1: Managers: Key to Information Technology Results60 Questions
Exam 2: Strategic Planning60 Questions
Exam 3: Project Management60 Questions
Exam 4: Business Processing and IT Outsourcing60 Questions
Exam 5: Corporate Governance and IT60 Questions
Exam 6: Collaboration Tools and Wireless Networks70 Questions
Exam 7: E-Business60 Questions
Exam 8: Enterprise Resource Planning60 Questions
Exam 9: Business Intelligence70 Questions
Exam 10: Knowledge Management70 Questions
Exam 11: Enterprise Architecture70 Questions
Exam 12: Ethical, privacy, and Security Issues70 Questions
Select questions type
An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again.
(True/False)
4.8/5
(40)
A(n)______________________________ is software and/or hardware that monitors system and network resources and activities,and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.
(Short Answer)
4.9/5
(42)
A ____ is an organization's review of potential threats to its computers and networks along with an analysis of the probability that these will occur and prevent the organization from meeting key business objectives.
(Multiple Choice)
4.8/5
(39)
It is crucial that antivirus software be updated continually with the latest virus detection information,called ____.
(Multiple Choice)
4.9/5
(41)
Define corporate ethics and explain the primary function of a corporate ethics policy.
(Essay)
4.9/5
(37)
Organizations should implement ____ to catch intruders in the act.
(Multiple Choice)
4.8/5
(34)
Most security experts recommend giving out specific information about a compromise in public forums,such as news reports,conferences,professional meetings,and online discussion groups.
(True/False)
4.8/5
(46)
____ refers to criminal activity in which a computer or a computer network is used as a tool to commit a crime or is the target of criminal activity.
(Multiple Choice)
4.9/5
(33)
When dealing with customer data,strong measures are required to avoid customer ___________________ problems.
(Short Answer)
4.7/5
(45)
All ____ should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original.
(Multiple Choice)
4.8/5
(37)
____ work to prevent an attack by blocking viruses,malformed packets,and other threats from getting into the company network.
(Multiple Choice)
4.8/5
(36)
More than 90 percent of major U.S.firms find it necessary to record and review employee communications and activities on the job,including e-mail,Web surfing,and phone usage.
(True/False)
4.8/5
(39)
In a nonprofit corporation,the board reports to shareholders,customers,employees,suppliers,and the community.
(True/False)
4.8/5
(32)
Significant improvements in security can require years and do not come easy.
(True/False)
4.9/5
(32)
Creating a detailed ____________________ of all events also will document the incident for later prosecution.
(Short Answer)
4.8/5
(29)
The experience from an incident should be used to update and revise the ____ plan.
(Multiple Choice)
5.0/5
(41)
Showing 41 - 60 of 70
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)