Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Information Systems Study Set 1
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 201
Multiple Choice
A smart card is a device the size of a credit card that contains embedded technology that stores information and small amounts of software and can act as ________.
Question 202
True/False
Multifactor authentication is the traditional security process, which requires a user name and passworD.
Question 203
Multiple Choice
What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?
Question 204
True/False
Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.
Question 205
Multiple Choice
What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?
Question 206
Multiple Choice
Which of the choices below represents the definition of information compliance?
Question 207
Multiple Choice
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?
Question 208
True/False
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
Question 209
Multiple Choice
What outlines the corporate guidelines or principles governing employee online communications?
Question 210
Multiple Choice
What includes a variety of threats such as viruses, worms, and Trojan horses?
Question 211
True/False
A zombie farm is a group of computers on which a hacker has planted zombie programs.
Question 212
Multiple Choice
What is phishing?
Question 213
Multiple Choice
Which of the following is not considered an epolicy?
Question 214
True/False
A user can opt out of receiving emails by choosing to deny permission to incoming emails.
Question 215
True/False
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
Question 216
Multiple Choice
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
Question 217
True/False
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.