Filters
Question type

Study Flashcards

Which of the following changes its form as it propagates?


A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which category of the cost of downtime includes equipment rental, overtime costs, and travel expenses?


A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following represents the definition of information governance?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following defines information security?


A) A broad term encompassing the protection of information.
B) Protection of information from accidental misuse.
C) Protection of information from intentional misuse.
D) All of these

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of these

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?


A) Elevation of privilege
B) Virus
C) Hacker
D) Worm

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?


A) Information spy
B) Hacker
C) Spyware
D) Adware

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

What is spyware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the below represents the definition of information secrecy?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D) The principles and standards that guide our behavior toward other people.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is ransomware?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 61 - 80 of 121

Related Exams

Show Answer