Filters
Question type

Study Flashcards

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?


A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

What is information secrecy?


A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following is one of the four basic options included in a bring your own device policy?


A) Unlimited access for personal devices
B) Access only to nonsensitive systems and data
C) Access, but preventing local storage of data on personal devices
D) All of the above

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

What is information transmitted without encryption and includes information collected from public records, phone books, corporate directories, or websites?


A) Personally identifiable information (PII)
B) Nonsensitive PII
C) Sensitive PII
D) Sock puppet marketing

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of the above

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What is a form of malicious software that infects your computer and asks for money?


A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?


A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) Spyware
B) Spam
C) Adware
D) None of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is personally identifiable information (PII) ?


A) Any data that could potentially identify a specific individual.
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

A) True
B) False

Correct Answer

verifed

verified

What is nonsensitive PII?


A) Any data that could potentially identify a specific individual.
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?


A) Information spy
B) Hacker
C) Spyware
D) Adware

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information secrecy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?


A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of the above

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.


A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 141 - 160 of 354

Related Exams

Show Answer