Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Information Systems Study Set 1
Exam 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 161
Multiple Choice
Which of the following definitions represents Internet censorship?
Question 162
Multiple Choice
The most secure procedures combine which of the following authentication and authorization techniques?
Question 163
True/False
Cyberbullying is an act or object that poses a danger to assets.
Question 164
Multiple Choice
Which of the following is considered a type of biometrics?
Question 165
Essay
Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.
Question 166
Multiple Choice
What is adware?
Question 167
Multiple Choice
What is cybervandalism?
Question 168
True/False
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Question 169
Multiple Choice
What is pharming?
Question 170
Multiple Choice
Which of the following changes its form as it propagates?
Question 171
True/False
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.