Filters
Question type

Study Flashcards

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

Correct Answer

verifed

verified

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?


A) Safety
B) Ethical standard
C) Privacy
D) Proper

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these offers an example of acting ethically.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

__________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

Correct Answer

verifed

verified

What is software written with malicious intent to cause annoyance or damage?


A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?


A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following should be included in a company email privacy policy?


A) Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization
B) Statement discouraging sending junk email or spam to anyone who doesn't want to receive it
C) Statement informing users that the organization has no control over email once it has been transmitted outside the organization
D) All of these

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

The three primary information security areas are authentication and authorization, policies and rewards, and detection and response.

A) True
B) False

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) Splog
B) Adware
C) Spygloss
D) CPU buzzer

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of these

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer.
B) A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites.
C) A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer.
D) All of these

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of these

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following would you find in a typical Internet use policy?


A) User ramifications if the policy is violated
B) User responsibility for properly handling offensive material
C) User responsibility for protecting the company's good name
D) All of these

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) Content filtering, encryption, and firewalls
B) Calculating, locking, and firewalls
C) Content prohibiting and cookies
D) None of these

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Identify theft is the forging of someone's identity for the purpose of __________.

Correct Answer

verifed

verified

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

Correct Answer

verifed

verified

A company should be able to calculate the cost of downtime by which of the following?


A) Per hour, per day, and per week
B) Per employee, per computer, and per company
C) Per stock, per stockholder, and per investment capital
D) None of these

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 101 - 120 of 225

Related Exams

Show Answer