Deck 10: Enterprise Resource Planning and Collaboration Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/200
Play
Full screen (f)
Deck 10: Enterprise Resource Planning and Collaboration Systems
1
What was the primary problem Saab encountered with one of its marketing companies?
A) Contacted customers based on opt-out decision
B) Contacted customers based on opt-in decision
C) Contacted customers regardless of their opt-out or opt-in decision
D) Failed to contact any customers
A) Contacted customers based on opt-out decision
B) Contacted customers based on opt-in decision
C) Contacted customers regardless of their opt-out or opt-in decision
D) Failed to contact any customers
C
2
What is software that is manufactured to look like the real thing and sold as such?
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
C
3
Which of the following is an effect of employee monitoring?
A) Employee absenteeism is on the rise.
B) Job satisfaction is on the rise.
C) Psychological reactance is prevented.
D) All of these.
A) Employee absenteeism is on the rise.
B) Job satisfaction is on the rise.
C) Psychological reactance is prevented.
D) All of these.
A
4
What is the ideal type of decisions for people in an organization to make?
A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
5
What is it called when you may use copyrighted material in certain situations-for example, in the creation of new work or, within certain limits, for teaching purposes?
A) Ethics
B) Intellectual property
C) Copyright
D) Fair dealing
A) Ethics
B) Intellectual property
C) Copyright
D) Fair dealing
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is not included in the four quadrants of ethical and legal behaviour?
A) Legal behaviour and ethical behaviour
B) Illegal behaviour and ethical behaviour
C) Legal behaviour and unethical behaviour
D) None of these
A) Legal behaviour and ethical behaviour
B) Illegal behaviour and ethical behaviour
C) Legal behaviour and unethical behaviour
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
7
What is a program, when installed on a computer, records every keystroke and mouse click?
A) Key logger software
B) Spyware
C) Cookie
D) Adware
A) Key logger software
B) Spyware
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
8
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
9
What are the principles and standards that guide our behaviour toward other people?
A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
10
What is intangible creative work that is embodied in physical form?
A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
11
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following describes confidentiality?
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following describes information technology monitoring?
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
14
Canada's privacy laws follow very closely to the:
A) European model
B) US model
C) Bork model
D) None of these
A) European model
B) US model
C) Bork model
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
15
What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
16
Information ethics concerns mainly:
A) Ethical issues
B) Moral issues
C) Judicious usage of information
D) All of these
A) Ethical issues
B) Moral issues
C) Judicious usage of information
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
17
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
18
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
19
_________ is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
A) Meergrubing
B) Beergrubing
C) Teergrubing
D) None of these
A) Meergrubing
B) Beergrubing
C) Teergrubing
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following describes privacy?
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behaviour toward other people
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behaviour toward other people
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is not one of the 10 guiding principles of PIPEDA for organizations:
A) Accountability
B) Accuracy
C) Open access
D) Safeguards
A) Accountability
B) Accuracy
C) Open access
D) Safeguards
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
22
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
A) informed; collaborate
B) consent; informed
C) informed; consent
D) None of these
A) informed; collaborate
B) consent; informed
C) informed; consent
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is not considered an ePolicy?
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) None of these
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
24
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
25
What is one of the major problems with email?
A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of these
A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
26
What is spam?
A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of these
A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
27
________ protects individual's health records.
A) HIPAA
B) COPPA
C) PIPEDA
D) None of these
A) HIPAA
B) COPPA
C) PIPEDA
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
28
________ is a U.S. federal law established in 1998 that applies to collectingpersonal information from American children who are under 13 years of age.
A) HIPAA
B) COPPA
C) PIPEDA
D) None of these
A) HIPAA
B) COPPA
C) PIPEDA
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
29
If an organization were to have only one policy, which one would it want?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is an example of acting ethically?
A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these
A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
31
Which policy contains general principles regarding information privacy?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
32
What is the policy that contains general principles to guide computer user behaviour?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following represents the classic example of unintentional information reuse?
A) Phone number
B) Social Insurance Number
C) Address
D) Driver's license number
A) Phone number
B) Social Insurance Number
C) Address
D) Driver's license number
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
34
What is a contractual stipulation that ensures that e-business participants do not deny their online actions?
A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
35
Which policy typically contains a nonrepudiation clause?
A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
36
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
A) Ethics
B) ePolicies
C) All of these
D) None of these
A) Ethics
B) ePolicies
C) All of these
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following describes ePolicies?
A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
38
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of these
A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following are covered by Canada's Privacy Act?
A) medical records
B) security clearances
C) tax records
D) All of these
A) medical records
B) security clearances
C) tax records
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
40
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
41
What is failover?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
42
Recovery is defined as:
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is not a part of the email privacy policy stipulations?
A) It defines who legitimate email users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's email
D) It informs people that the organization has full control over email once it is transmitted outside the organization
A) It defines who legitimate email users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's email
D) It informs people that the organization has full control over email once it is transmitted outside the organization
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is part of the acceptable use policy stipulations?
A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of these
A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
45
What identifies the rules required to maintain information security?
A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
46
What is identity theft?
A) Is the forging of someone's identity for the purpose of fraud
B) Is monitoring emails
C) Is hacking in a computer system with the purpose of stealing information
D) Is buying illegal information from a hacker
A) Is the forging of someone's identity for the purpose of fraud
B) Is monitoring emails
C) Is hacking in a computer system with the purpose of stealing information
D) Is buying illegal information from a hacker
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
47
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?
A) Hactivist
B) Social engineering
C) Insiders
D) Virus
A) Hactivist
B) Social engineering
C) Insiders
D) Virus
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
48
What is fault tolerance?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
49
What is social engineering?
A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is not one of the top 10 questions managers should ask regarding information security?
A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?
A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
51
What is the primary difference between the different types of backup/recovery media?
A) Speed
B) Cost
C) Expense
D) All of these
A) Speed
B) Cost
C) Expense
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
52
What is a backup?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is part of the acceptable use policy stipulations?
A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a type of backup/recovery media?
A) DVD
B) Tape
C) Disk
D) All of these
A) DVD
B) Tape
C) Disk
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
55
Which policy details the extent to which email messages may be read by others?
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of these
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
56
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
57
What is the recommended way to implement information security lines of defence?
A) People first, technology second
B) Technology first, people second
C) Revenue first, People next
D) All of these
A) People first, technology second
B) Technology first, people second
C) Revenue first, People next
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
58
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is not one of the five steps for creating an information security plan?
A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks
A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
60
What is recovery?
A) The ability to get a system up and running in the event of a system crash
B) The ability to get a system up and running in the event of a system failure
C) Restoring the information backup
D) All of these
A) The ability to get a system up and running in the event of a system crash
B) The ability to get a system up and running in the event of a system failure
C) Restoring the information backup
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is not one of the three primary information security areas?
A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of these
A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
62
What does the disaster recovery cost curve chart?
A) The cost to the organization of the unavailability of information
B) The cost to the organization of recovering from a disaster over time
C) The cost to the organization of the unavailability of technology
D) All of these
A) The cost to the organization of the unavailability of information
B) The cost to the organization of recovering from a disaster over time
C) The cost to the organization of the unavailability of technology
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
63
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
A) Biometrics
B) Encryption
C) Firewalls
D) Content Filtering
A) Biometrics
B) Encryption
C) Firewalls
D) Content Filtering
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following can be completed by encryption?
A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of these
A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
65
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
A) Token
B) Password
C) Smart card
D) Biometrics
A) Token
B) Password
C) Smart card
D) Biometrics
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
66
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster?
A) Disaster recovery plan
B) Disaster recovery cost curve
C) Hot site
D) Cold site
A) Disaster recovery plan
B) Disaster recovery cost curve
C) Hot site
D) Cold site
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
67
What is the most secure type of authentication?
A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) Combination of all of these
A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) Combination of all of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
68
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
69
What is a method for confirming users' identities?
A) Authentication
B) Prevention
C) Detection
D) Response
A) Authentication
B) Prevention
C) Detection
D) Response
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
70
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
A) Hourly
B) Daily
C) Weekly
D) Monthly
A) Hourly
B) Daily
C) Weekly
D) Monthly
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
71
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
A) Smart card
B) Token
C) Biometrics
D) Content filtering
A) Smart card
B) Token
C) Biometrics
D) Content filtering
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is considered a type of biometrics?
A) Voice
B) Face
C) Iris
D) All of these
A) Voice
B) Face
C) Iris
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
73
What is encryption?
A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email
A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
74
What is the most costly and intrusive form of authentication?
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of these
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
75
What includes a variety of threats such as viruses, worms, and Trojan horses?
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following does a firewall perform?
A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of these
A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
77
What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information?
A) Hourly
B) Daily
C) Weekly
D) All of these
A) Hourly
B) Daily
C) Weekly
D) All of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
78
Where do organizations typically place firewalls?
A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following authentication methods is 100 percent accurate?
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
80
What are the technologies available to help prevent and build resistance to attacks?
A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck