Filters
Question type

Study Flashcards

An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the Internet.

A) True
B) False

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?


A) smart card
B) token
C) biometrics
D) content filtering

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) mail bomb
B) spam
C) intellectual spam
D) junk mail

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these are examples of acting ethically.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) information technology code
B) technology policy
C) ethical computer use policy
D) information systems

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) must never upgrade or change vendors
B) must download a portable button for it to activate
C) must frequently update it to protect against viruses
D) All of these are correct.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) digital code
B) digital sign
C) digital certificate
D) digital card

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the choices below represents the definition of information governance?


A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is software written with malicious intent to cause annoyance or damage?


A) elevation of privilege
B) spoofing
C) sniffer
D) virus

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the choices below defines information security?


A) a broad term encompassing the protection of information
B) protects information from accidental misuse
C) protects information from intentional misuse
D) All of these are correct.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?


A) employees copying and distributing company-owned software
B) employees searching other employee's private information without consent
C) employees intentionally creating or spreading viruses to confuse IT
D) All of these are correct.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

A) True
B) False

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or branD.

A) True
B) False

Correct Answer

verifed

verified

BYOD policies offer four basic options, including 1) unlimited access for personal devices, 2) access only to nonsensitive systems and data, 3) access, but with IT control over personal devices, apps, and stored data, and 4) access, but preventing local storage of data on personal devices.

A) True
B) False

Correct Answer

verifed

verified

What is one of the major problems with email?


A) intellectual property
B) nonrepudiation
C) user's expectation of privacy
D) None of these are correct.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?


A) voiceprint
B) face
C) iris
D) All of these are correct.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

A) True
B) False

Correct Answer

verifed

verified

What is information security?


A) a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
B) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 221 - 240 of 331

Related Exams

Show Answer