Exam 12: Ethical, privacy, and Security Issues

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again.

(True/False)
4.8/5
(40)

A(n)______________________________ is software and/or hardware that monitors system and network resources and activities,and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization.

(Short Answer)
4.9/5
(42)

Ethical behavior conforms to ____.

(Multiple Choice)
4.8/5
(31)

A ____ is an organization's review of potential threats to its computers and networks along with an analysis of the probability that these will occur and prevent the organization from meeting key business objectives.

(Multiple Choice)
4.8/5
(39)

It is crucial that antivirus software be updated continually with the latest virus detection information,called ____.

(Multiple Choice)
4.9/5
(41)

Define corporate ethics and explain the primary function of a corporate ethics policy.

(Essay)
4.9/5
(37)

Organizations should implement ____ to catch intruders in the act.

(Multiple Choice)
4.8/5
(34)

Most security experts recommend giving out specific information about a compromise in public forums,such as news reports,conferences,professional meetings,and online discussion groups.

(True/False)
4.8/5
(46)

Why is it important to conduct periodic IT security audits?

(Essay)
4.9/5
(36)

In a security incident,the primary goal must be ____.

(Multiple Choice)
4.8/5
(39)

____ refers to criminal activity in which a computer or a computer network is used as a tool to commit a crime or is the target of criminal activity.

(Multiple Choice)
4.9/5
(33)

When dealing with customer data,strong measures are required to avoid customer ___________________ problems.

(Short Answer)
4.7/5
(45)

All ____ should be created with enough frequency to enable a full and quick restoration of data if an attack destroys the original.

(Multiple Choice)
4.8/5
(37)

____ work to prevent an attack by blocking viruses,malformed packets,and other threats from getting into the company network.

(Multiple Choice)
4.8/5
(36)

More than 90 percent of major U.S.firms find it necessary to record and review employee communications and activities on the job,including e-mail,Web surfing,and phone usage.

(True/False)
4.8/5
(39)

In a nonprofit corporation,the board reports to shareholders,customers,employees,suppliers,and the community.

(True/False)
4.8/5
(32)

Significant improvements in security can require years and do not come easy.

(True/False)
4.9/5
(32)

Creating a detailed ____________________ of all events also will document the incident for later prosecution.

(Short Answer)
4.8/5
(29)

List three specific responsibilities of an ethics officer.

(Essay)
4.9/5
(31)

The experience from an incident should be used to update and revise the ____ plan.

(Multiple Choice)
5.0/5
(41)
Showing 41 - 60 of 70
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)