Filters
Question type

Study Flashcards

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

Within the third area of detection and response, a(n) __________ detection software features full-time monitoring tools that search for patterns in network traffic to identify intruders.

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Sniffer
B) Spyware
C) Spoofware
D) Splog

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following represents the definition of information compliance?


A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following defines information security?


A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of these

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Phishing
B) Authentication
C) Authorization
D) Programming

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.


A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.


A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) Consent, information

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A digital _____________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?


A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank, and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?


A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

There are two means of stealing an identity; ____________ reroutes requests for legitimate websites to false websites.

Correct Answer

verifed

verified

___________ attack computer systems by transmitting a virus hoax, with a real virus attached.

Correct Answer

verifed

verified

Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?


A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

___________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

Correct Answer

verifed

verified

All of the following are types of information security breaches except:


A) Insiders
B) E-espionage
C) Dumpster diving
D) Ediscovery

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Showing 141 - 160 of 225

Related Exams

Show Answer