Filters
Question type

Study Flashcards

The most secure procedures combine which of the following authentication and authorization techniques?


A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) All of these

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website that contains information about customers and their web activities?


A) Key logger
B) Hardware key logger
C) Cookie
D) Adware

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

___________ is a method for confirming users' identities.

Correct Answer

verifed

verified

Which of the following would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, ad spiders, and white-hat hackers
D) None of these

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Companies vary in how they expect employees to use computers; however, the overriding principle that needs to be included with these policies should include informed __________.

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following is not considered a form of biometrics?


A) Iris scan
B) Password
C) Fingerprint
D) Handwriting

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Content ____________ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

Correct Answer

verifed

verified

An information security ___________ details how an organization will implement the information security policies.

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys, one for public and one for private?


A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is included in the four quadrants of ethical and legal behavior?


A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of these

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month.Since the resort implemented a new software system, there have been a much larger number of threats and breaches of company information.He suspects that this may be the result of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?


A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of these

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which act restricts what information the federal government can collect?


A) Privacy Act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of these

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 225

Related Exams

Show Answer