Exam 13: Security and Ethical Challenges
Exam 1: Foundations of Information Systems in Business138 Questions
Exam 2: Competing With Information Technology125 Questions
Exam 3: Computer Hardware157 Questions
Exam 4: Computer Software146 Questions
Exam 5: Data Resource Management117 Questions
Exam 6: Telecommunications and Networks131 Questions
Exam 7: E-Business Systems118 Questions
Exam 8: Business Across the Enterprise115 Questions
Exam 9: E-Commerce Systems121 Questions
Exam 10: Supporting Decision Making123 Questions
Exam 11: Businessit Strategies for Development122 Questions
Exam 12: Implementing Businessit Solutions141 Questions
Exam 13: Security and Ethical Challenges116 Questions
Exam 14: Enterprise and Global Management of Information Technology121 Questions
Select questions type
Which of the following statements about adware and spyware is true?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
A
Talking unsuspecting company employees out of valuable information such as passwords is called:
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
D
In the United States, opt-out is the default position, whereas in Europe consumers must opt-in or their personal information cannot be used.
Free
(True/False)
4.9/5
(46)
Correct Answer:
True
Security suites integrate virus protection with firewalls, Web security, and encrypted e-mail.
(True/False)
4.9/5
(29)
Hammering a Web site's equipment with too many requests for information, slowing performance or even crashing the site is called:
(Multiple Choice)
4.7/5
(32)
A sniffer is a program that covertly searches individual packets of data as they pass through the Internet, capturing passwords or content.
(True/False)
4.8/5
(29)
Most companies don't reveal that they have been targets or victims of computer crime.
(True/False)
5.0/5
(42)
One of the major principles of technology ethics is that even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk. This principle is:
(Multiple Choice)
4.9/5
(31)
Many companies and organizations have established guidelines for ethical conduct, but very few specify that company computer workstations and networks are company resources to be used for work-related uses only.
(True/False)
4.8/5
(38)
Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.
(Multiple Choice)
4.9/5
(42)
In 2000, hackers broke into hundreds of servers and planted Trojan horse .exe programs, which were then used to launch a barrage of service requests in a concerted attack at e-commerce websites, such as Yahoo! and eBay. This is an example of a distributed ________________ attack.
(Multiple Choice)
4.9/5
(34)
Information technologies have caused a significant reduction in the following types of job opportunities, except:
(Multiple Choice)
4.7/5
(20)
Laws intended to regulate activities over the Internet or via the use of electronic data communications are collectively referred to as ________________ law.
(Short Answer)
4.9/5
(27)
The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks.
(Multiple Choice)
4.8/5
(36)
According to the text, which are the four basic categories of ethical business issues where information technology has caused ethical controversy?
(Multiple Choice)
4.8/5
(40)
Computer monitoring has been criticized as unethical because:
(Multiple Choice)
4.8/5
(29)
According to the text case, about two-thirds of the companies surveyed monitor their Internet connections, but only two states require informing employees that they do so.
(True/False)
4.9/5
(37)
Showing 1 - 20 of 116
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)