Filters
Question type

Study Flashcards

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.

Correct Answer

verifed

verified

A(n) ___________ privacy policy contains general principles regarding information privacy.

Correct Answer

verifed

verified

_________ have philosophical and political reasons for breaking into systems and will often deface the Web site as a protest.

Correct Answer

verifed

verified

Which of the following is not one of the top 10 questions managers should ask regarding information security?


A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.

Correct Answer

verifed

verified

What is software that is manufactured to look like the real thing and sold as such?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords __________.

Correct Answer

verifed

verified

Which of the following is part of the acceptable use policy stipulations?


A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of the above

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

___________ is a method for confirming users' identities.

Correct Answer

verifed

verified

___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.


A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Describe the important ethical concepts stemming from information technology.

Correct Answer

verifed

verified

Intellectual property-intangible creativ...

View Answer

Which of the following describes information technology monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What attacks computer systems by transmitting a virus hoax, with a real virus attached?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 171

Related Exams

Show Answer