Filters
Question type

Study Flashcards

The unauthorized use, duplication, distribution, or sale of copyrighted software is called ____________ software.

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Techie policy
C) Ethical computer use policy
D) Information systems

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

A denial-of-service attack (DoS) _______________ a website with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the following company policies?


A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of these

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense; the first is __________, and the second is technology.

Correct Answer

verifed

verified

Key logger or key trapper software is a __________ that, when installed on a computer, records every keystroke and mouse click.

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) Technology first, customers second
B) Technology first, people second
C) Innovation first, technology second
D) People first, technology second

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) Be as specific as possible, stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Information security ___________ identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.

Correct Answer

verifed

verified

Information ____________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What can encryption technology perform?


A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of these

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?


A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?


A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

According to the text, Visa created a program called Innovant.What was the primary purpose for Innovant?


A) Information governance
B) Information privacy policy
C) Ethical computer use policy
D) Acceptable use policy

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?


A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?


A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Correct Answer

verifed

verified

Showing 181 - 200 of 225

Related Exams

Show Answer