Filters
Question type

Study Flashcards

Which of the following represents the definition of information property?


A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

A company should be able to calculate the cost of downtime by which of the following?


A) Per hour, per day, and per week
B) Per employee, per computer, and per company
C) Per stock, per stockholder, and per investment capital
D) None of these

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is software written with malicious intent to cause annoyance or damage?


A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

What is scareware?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is the Child Online Protection Act?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is a hacker?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Standards of living
D) Security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is included in the four quadrants of ethical and legal behavior?


A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the choices are correct

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A DDoS stands for one of the common forms of viruses that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?


A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which category of the cost of downtime includes equipment rental, overtime costs, and travel expenses?


A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following represents the definition of information compliance?


A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following defines information security?


A) A broad term encompassing the protection of information
B) Protection of information from accidental misuse
C) Protection of information from intentional misuse
D) All of these

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Emily Kent works as a computer programmer for a software company. Her boss, Sam Anderson, is responsible for developing a new software game for the Nintendo Switch. After completion of the project, Sam gives all of the team members a free copy of the game without consent from the company. Emily is a little hesitant and unsure about accepting the game because legally it would be considered ________.


A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

What is ediscovery?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 132

Related Exams

Show Answer