Filters
Question type

Study Flashcards

____________ are the principles and standards that guide our behaviour toward other people.

Correct Answer

verifed

verified

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

The information security plan ...

View Answer

ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.

Correct Answer

verifed

verified

The gist of the 10 Guiding Principles of PIPEDA for Organizations can be remembered as the 3Cs: Consent,Choice,and __________.

Correct Answer

verifed

verified

_________ is unsolicited e-mail.

Correct Answer

verifed

verified

A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

Denial-of-service attack (DoS)_______________ a Web site with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Correct Answer

verifed

verified

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

___________ attack computer systems by transmitting a virus hoax,with a real virus attached.

Correct Answer

verifed

verified

Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.

A) True
B) False

Correct Answer

verifed

verified

__________ is software that comes hidden in free downloadable software and tracks online movements,mines the information stored on a computer,or uses a computer's CPU and storage for some task the user know nothing about.

Correct Answer

verifed

verified

Which of the following is part of the acceptable use policy stipulations?


A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Which is a virus that opens a way into the network for future attacks?


A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is/are covered by Canada's Privacy Act:


A) medical records
B) security clearances
C) tax records
D) All of the above

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

What is encryption?


A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited e-mail

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are people very knowle...

View Answer

Summarize the different monitoring technologies and explain the importance of an employee monitoring policy

Correct Answer

verifed

verified

Different monitoring technologies includ...

View Answer

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

Showing 101 - 120 of 171

Related Exams

Show Answer