Filters
Question type

Study Flashcards

What is two-factor authentication?


A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information. He suspects that this may be the cause of an internal employee. He needs to clarify and establish what type of plan to help reduce further problems?


A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following represents the two fundamental building blocks that protect organizational information?


A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

A) True
B) False

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

What are biometrics?


A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

A) True
B) False

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.


A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) Consent, information

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes workplace MIS monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

What is a phishing expedition?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is included in the four quadrants of ethical and legal behavior?


A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses is called phishing.

A) True
B) False

Correct Answer

verifed

verified

What decodes information?


A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of the above

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 60 of 354

Related Exams

Show Answer