Correct Answer
verified
Multiple Choice
A) smart card
B) token
C) biometrics
D) content filtering
Correct Answer
verified
Multiple Choice
A) mail bomb
B) spam
C) intellectual spam
D) junk mail
Correct Answer
verified
Multiple Choice
A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these are examples of acting ethically.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) information technology code
B) technology policy
C) ethical computer use policy
D) information systems
Correct Answer
verified
Multiple Choice
A) must never upgrade or change vendors
B) must download a portable button for it to activate
C) must frequently update it to protect against viruses
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) digital code
B) digital sign
C) digital certificate
D) digital card
Correct Answer
verified
Multiple Choice
A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) elevation of privilege
B) spoofing
C) sniffer
D) virus
Correct Answer
verified
Multiple Choice
A) a broad term encompassing the protection of information
B) protects information from accidental misuse
C) protects information from intentional misuse
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) employees copying and distributing company-owned software
B) employees searching other employee's private information without consent
C) employees intentionally creating or spreading viruses to confuse IT
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) intellectual property
B) nonrepudiation
C) user's expectation of privacy
D) None of these are correct.
Correct Answer
verified
Multiple Choice
A) voiceprint
B) face
C) iris
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
B) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Showing 221 - 240 of 331
Related Exams