Filters
Question type

Study Flashcards

___________ attack computer systems by transmitting a virus hoax,with a real virus attached.

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A non-repudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

e-Policies are policies and procedures that address information management along with the ethical use of computers and the internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses,is called phishing.

A) True
B) False

Correct Answer

verifed

verified

What are critical questions that managers should ask when determining the cost of downtime?


A) What is the productivity cost associated with each hour of downtime?
B) How many transactions can the company afford to lose without significantly harming business?
C) All of the answers are correct
D) None of the answers is correct

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.


A) Informed,collaborate
B) Consent,informed
C) Informed,consent
D) Consent,information

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers,resolving customer issues,and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?


A) An information privacy policy
B) An email privacy policy
C) An internet use policy
D) A workplace monitoring policy

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1)authentication and authorisation; (2)prevention and resistance; and (3)detection and response.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Certainly! Here are examples for each of...

View Answer

What is the difference between phishing and pharming?


A) Phishing is not illegal,pharming is illegal
B) Phishing is the right of the company,where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft,and pharming reroutes requests for legitimate websites to false websites
D) All of the answers are correct

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Spyware is software which,while purporting to serve some useful function and often fulfilling that function,also allows internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

Companies vary in how they expect employees to use computers; however,the overriding principle that needs to be included with these policies should include informed _________.

Correct Answer

verifed

verified

Consent

Which of the following are all common forms of viruses?


A) Packet tampering,worms,cakes and Trojan viruses
B) Polymorphic,sniffer,splogs and Denial-of-service viruses
C) Backdoor program,worm and Trojan-horse viruses
D) All of the answers are correct

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

C

Crackers,cyberterrorists,hactivists and script bunnies are all types of _________.

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company.Her boss,Mike Jones,is responsible for developing a new software game for the Wii.After completion of the project,Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.


A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

As the president of a local trade company,Kristin is faced with leadership,ethical and operational decisions on a daily basis.Kristen's responsibilities include examining the organisational resource of information and regulating its definitions,uses,value and distribution ensuring it has the types of data/information required to function and grow effectively.What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 80

Related Exams

Show Answer