Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
Correct Answer
verified
Multiple Choice
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking
Correct Answer
verified
Multiple Choice
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Multiple Choice
A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
Correct Answer
verified
Multiple Choice
A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Downtime
B) MIS down
C) Direct data loss
D) Downtown
Correct Answer
verified
Multiple Choice
A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)
Correct Answer
verified
Multiple Choice
A) Per hour, per day, and per week
B) Per employee, per computer, and per company
C) Per stock, per stockholder, and per investment capital
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Technology first, customers second
B) Technology first, people second
C) Innovation first, technology second
D) People first, technology second
Correct Answer
verified
Multiple Choice
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
Multiple Choice
A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage
Correct Answer
verified
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above
Correct Answer
verified
Showing 101 - 120 of 354
Related Exams