A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists
Correct Answer
verified
Multiple Choice
A) An insider
B) Dumpster diving
C) Social engineering
D) Phishing
Correct Answer
verified
Multiple Choice
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) What is the productivity cost associated with each hour of downtime?
B) How many transactions can the company afford to lose without significantly harming business?
C) All of these
D) None of these
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
Correct Answer
verified
Multiple Choice
A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of these
Correct Answer
verified
Multiple Choice
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of All of these
Correct Answer
verified
Multiple Choice
A) Downtime
B) MIS down
C) Direct data loss
D) Downtown
Correct Answer
verified
Showing 61 - 80 of 225
Related Exams