Filters
Question type

Study Flashcards

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information privacy concerns the legal right or general expectation of individuals,groups or institutions to determine for themselves when and to what extent information about them is communicated to others.

A) True
B) False

Correct Answer

verifed

verified

Which of the following issues need to be taken into account when considering using a cloud computing solution to store personal information?


A) Is your data protected even in foreign jurisdictions?
B) What kinds of security measures are provided?
C) For how long will the cloud service provider hold the data of your business,and what protocols have been established to back up or destroy your data?
D) All of the answers are correct

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

An acceptable use policy (AUP)requires a user to agree to follow the policy to be provided access to corporate email,information systems and the internet.

A) True
B) False

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the answers is correct

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What type of internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was,what ads were viewed and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Intellectual property is ________________ creative work that is embodied in physical form and includes copyrights,trademarks and patents.

Correct Answer

verifed

verified

Which of the below is not one of the eight e-policies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea,such as a song,book or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What is it called when a hacker looks through your rubbish to find personal information?


A) Striker bunny
B) Dumpster diving
C) Rubbish retrieval
D) Approved consent

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat,cracker,cyberterrorist,hactivist,script kiddy and white-hat hacker
B) Black-top,cookie,script kid,environment,Web 3.0 and white-top hacker
C) Black-hat,script kiddy,script bat,spider crawler,Ad spiders and white-hat hacker
D) None of the answers is correct

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The best and most effective way to manage authentication is through __________.


A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not an example of unplanned downtime?


A) Power outages
B) Tornados
C) A system upgrade
D) Network failure

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behaviour?


A) Information technology code
B) Techie policy
C) Ethical computer use policy
D) Information systems

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which company policy did Visa create the program 'Inovant' to handle?


A) Information governance
B) Information privacy policy
C) Ethical computer use policy
D) Acceptable use policy

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames,passwords and personal information numbers.Angela and a co-worker decide to use the sensitive information to open credit cards in a few of her customers' names.This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 61 - 80 of 80

Related Exams

Show Answer