Filters
Question type

Study Flashcards

Applications allowed to be placed on the corporate network,like IM software,and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?


A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Web log
C) Adware
D) Hardware key logger

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Backdoor programs open a way into the network for future attacks.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) Technology first,customers second
B) Technology first,people second
C) Innovation first,technology second
D) People first,technology second

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.

A) True
B) False

Correct Answer

verifed

verified

A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.

A) True
B) False

Correct Answer

verifed

verified

Which of the below defines information security?


A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of the above

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Identify theft is the forging of someone's identity for the purpose of __________.

Correct Answer

verifed

verified

In the information technology world,which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

__________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Who are experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge?


A) Information spy
B) Hacker
C) Spyware
D) Adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) Content filtering,encryption,and firewalls
B) Calculating,locking,and firewalls
C) Content prohibiting,and cookies
D) None of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Opt ________ of receiving emails by choosing to deny permission to incoming emails.

Correct Answer

verifed

verified

Trust between companies,customers,partners,and suppliers are the support structure of which of the following?


A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 321 - 340 of 342

Related Exams

Show Answer