Filters
Question type

Study Flashcards

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and ________.


A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Which of the below would you find in a typical Internet use policy?


A) User ramifications if the policy is violated
B) User responsibility for properly handling offensive material
C) User responsibility for protecting the company's good name
D) All of the above

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents opt-out?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails.
D) Choosing to deny permission to incoming emails.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?


A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

An ethical computer use policy contains ...

View Answer

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is software that is intended to damage or disable computers and computer systems?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network

A) True
B) False

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration of a speaker's mouth and throat, can be expressed as a mathematical formula. Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.

A) True
B) False

Correct Answer

verifed

verified

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Showing 341 - 354 of 354

Related Exams

Show Answer