A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Correct Answer
verified
Multiple Choice
A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Standards of living
D) Security
Correct Answer
verified
Multiple Choice
A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
Correct Answer
verified
Multiple Choice
A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information security
B) Physical security
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information codes
B) Information management
C) Information deployment
D) Information security
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Simplelocker
Correct Answer
verified
Multiple Choice
A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Downtime
B) MIS down
C) Direct data loss
D) Downtown
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Drive-by hacking
C) Polymorphic viruses and worms
D) Hacker
Correct Answer
verified
Showing 101 - 120 of 121
Related Exams