Filters
Question type

Study Flashcards

Which act protects investors by improving the accuracy and reliability of corporate disclosures?


A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of these

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

_________ programs are viruses that open a way into the network for future attacks.

Correct Answer

verifed

verified

Backdoor

The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called __________ computer use policy.

Correct Answer

verifed

verified

With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employee's activities by measures as keystrokes, error rate, and number of transaction processed?


A) Anti-spam system
B) Information intelligence system
C) Information technology monitoring
D) Company technology monitoring

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?


A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

A(n) _________ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.

Correct Answer

verifed

verified

An email ____________ policy details the extent to which email messages may be read by others.

Correct Answer

verifed

verified

A DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?


A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal; pharming is illegal
B) Phishing is the right of the company; pharming is the right of the individual.
C) Phishing is a technique to gain personal information for the purpose of identity theft; pharming reroutes requests for legitimate websites to false websites.
D) All of these

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following represents the biggest problem of information security breaches?


A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?


A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

B

Which of the following is not considered an epolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

D

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Information _______________ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

Correct Answer

verifed

verified

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of these

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 225

Related Exams

Show Answer