Filters
Question type

Study Flashcards

_________ programs are viruses that open a way into the network for future attacks.

Correct Answer

verifed

verified

_________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.

Correct Answer

verifed

verified

Breaches in information ________________ occur when improper disclosure of personal information are made.

Correct Answer

verifed

verified

What is spam?


A) A type of encryption
B) A type of content filtering
C) A form of unsolicited e-mail
D) None of the above

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behaviour toward other people

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Information security ______________ identify the rules required to maintain information security.

Correct Answer

verifed

verified

What is one of the major problems with e-mail?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The _______ of Death is a common type of DDoS and occurs when thousands of computers try to access a Web site at the same time, overloading it and shutting it down.

Correct Answer

verifed

verified

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

Ethical concerns over employee monitoring occurs when the monitoring is unprecedented or overly intrusive

A) True
B) False

Correct Answer

verifed

verified

Spoofing is the forging of the _________ address on an e-mail so teat the e-mail message appears to come from someone other than the actual sender.

Correct Answer

verifed

verified

Which of the following is part of the acceptable use policy stipulations?


A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Smart card is a(n) _______ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.

Correct Answer

verifed

verified

A(n) __________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.

Correct Answer

verifed

verified

A(n) __________ use policy contains general principles to guide the proper use of the Internet.

Correct Answer

verifed

verified

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

Correct Answer

verifed

verified

If an organization were to have only one policy, which one would it want?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

Which of the following is not considered an ePolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) None of the above

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 171

Related Exams

Show Answer