Filters
Question type

Study Flashcards

Which of the below represents the definition of information management?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is the difference between pirated and counterfeit software?


A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Standards of living
D) Security

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

What is information security?


A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?


A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What is digital rights management?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

A) True
B) False

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?


A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Information compliance is the act of conforming, acquiescing, or yielding information.

A) True
B) False

Correct Answer

verifed

verified

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?


A) Information security
B) Physical security
C) Drive-by hacking
D) Adware

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively.What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?


A) Sniffer
B) Spyware
C) Spoofware
D) Simplelocker

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Backdoor programs change their form as they propagate.

A) True
B) False

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) Backdoor programs
B) Drive-by hacking
C) Polymorphic viruses and worms
D) Hacker

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 101 - 120 of 121

Related Exams

Show Answer