Filters
Question type

Study Flashcards

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues.For example, imagine you purchase a digital camera on eBay.Three months later, you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course, this email is not actually from eBay, and as soon as you log in, your information will be stolen.What type of information security breach would you consider this to be?


A) An insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?


A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

_______________ software is software that is manufactured to look like the real thing and sold as such.

Correct Answer

verifed

verified

___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

A process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space, is called authentication.

A) True
B) False

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned, depending on how you view the relationship between ________ and ________.


A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Included in the information security policy, managers should consider including virus protection, which includes how often the system should be scanned and how frequently the software should be __________.

Correct Answer

verifed

verified

What are critical questions that managers should ask when determining the cost of downtime?


A) What is the productivity cost associated with each hour of downtime?
B) How many transactions can the company afford to lose without significantly harming business?
C) All of these
D) None of these

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

_________ is unsolicited email.

Correct Answer

verifed

verified

Crackers, cyberterrorists, hactivists, and script bunnies are all types of __________.

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?


A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which act strengthened criminal laws against identity theft?


A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of these

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of All of these

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Showing 61 - 80 of 225

Related Exams

Show Answer