Filters
Question type

Study Flashcards

Which of the choices below represents the definition of information secrecy?


A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What scrambles information into an alternative form that requires a key or password to decrypt?


A) digital certificate
B) encryption
C) decrypt
D) cryptography

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reasons on personal networks are two areas that should be addressed by managers in which of the following company policies?


A) information ethics policy
B) information security policies
C) information technology plan
D) All of these are correct.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

A) True
B) False

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

What refers to choosing to allow permissions to incoming emails?


A) opt out
B) opt in
C) BYOD
D) nonrepudiation

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What can encryption technology perform?


A) switch the order of characters
B) replace characters with other characters
C) insert or remove characters
D) All of these are correct.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

A) True
B) False

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) information bullying
B) cybervandalism
C) cookie
D) BYOD

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense.The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

Which of the following are all common forms of viruses?


A) packet tampering, worms, cakes, and trojan viruses
B) polymorphic, sniffer, splogs, and denial-of-service viruses
C) backdoor program, worm, Trojan-horse viruses
D) All of these are correct.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processeD.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?


A) interconnected data software (IDS)
B) intrusion detection software (IDS)
C) security Information system (SIS)
D) internet detection scanner (IDS)

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?


A) privacy
B) confidentiality
C) intellectual property
D) copyright

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

A) True
B) False

Correct Answer

verifed

verified

What is the Child Online Protection Act?


A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the choices below represents the definition of information management?


A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is a threat?


A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Showing 181 - 200 of 331

Related Exams

Show Answer