Filters
Question type

Study Flashcards

Content ____________ occurs when organizations use software that filters content,such as emails,to prevent the accidental or malicious transmission of unauthorized information.

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of the above

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

The ___________ of downtime is split into four categories: financial performance,revenue,damaged reputations,and other expenses.

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

Which of the following is included in the four quadrants of ethical and legal behavior?


A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Within the third area of detection and response,an __________ detection software features full-time monitoring tools that search for patterns in network traffic to identify intruders.

Correct Answer

verifed

verified

What is spyware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

___________ is a method for confirming users' identities.

Correct Answer

verifed

verified

What uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information ethics

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and ________.


A) Legal;confidential
B) Legal;ethical
C) Legal;technical
D) Confidential;open

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?


A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which act strengthened criminal laws against identity theft?


A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which company policy did Visa create the program 'Innovant' to handle?


A) Information governance
B) Information privacy policy
C) Ethical computer use policy
D) Acceptable use policy

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it Janet is creating the potential for which type of information security breach to occur?


A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of the above

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1)authentication and authorization,(2)prevention and resistance,and (3)detection and response.

Correct Answer

verifed

verified

Authentication and authorization: Authen...

View Answer

Which of the below is a common Internet monitoring technology?


A) Key logger
B) Hardware key logger
C) Cookie
D) All of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 121 - 140 of 342

Related Exams

Show Answer