Filters
Question type

Study Flashcards

Which policy typically contains a nonrepudiation clause?


A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is the most costly and intrusive form of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Discuss the reasons why privacy issues lose trust for e-businesses.

Correct Answer

verifed

verified

Loss of personal privacy is a top concer...

View Answer

____________ is the identification of a user based on a physical characteristic.

Correct Answer

verifed

verified

A(n) _________ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

Correct Answer

verifed

verified

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Hardware key logger
C) Cookie
D) Adware

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following is an effect of employee monitoring?


A) Employee absenteeism is on the rise.
B) Job satisfaction is on the rise.
C) Psychological reactance is prevented.
D) All of the above.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

_________ is unsolicited e-mail.

Correct Answer

verifed

verified

Intrusion detection software (IDS) searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.

Correct Answer

verifed

verified

Develop the information security policies is the ________________ step for creating an information security plan.

Correct Answer

verifed

verified

What are the principles and standards that guide our behaviour toward other people?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of the above

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Authentication
B) Prevention
C) Detection
D) Response

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What is the recommended way to implement information security lines of defence?


A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Correct Answer

verifed

verified

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

Correct Answer

verifed

verified

Showing 21 - 40 of 171

Related Exams

Show Answer