Filters
Question type

Study Flashcards

What is the difference between pirated and counterfeit software?


A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

What is digital rights management?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) Law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following represents the definition of information governance?


A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to break into the computer system of one of Cyber Protect's top clients to identify system vulnerabilities and plug the holes. What type of hacker is Matt?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

A) True
B) False

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

What is ransomware?


A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

A

Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?


A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

False

A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?


A) Information spy
B) Hacker
C) Spyware
D) Adware

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Pirated software is software that is manufactured to look like the real thing and sold as such.

A) True
B) False

Correct Answer

verifed

verified

What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?


A) Elevation of privilege
B) Virus
C) Hacker
D) Worm

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

C

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?


A) Information security
B) Physical security
C) Drive-by hacking
D) Adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 132

Related Exams

Show Answer