Filters
Question type

Study Flashcards

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

An ethical computer use policy contains ...

View Answer

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs's top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Intellectual property is _________________ creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

Correct Answer

verifed

verified

Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

____________ are the principles and standards that guide our behavior toward other people.

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

Correct Answer

verifed

verified

Authentication and authorization: Authen...

View Answer

What is it called when a hacker looks through your trash to find personal information?


A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of these

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is not an example of unplanned downtime?


A) Power outages
B) Tornados
C) A system upgrade
D) Network failure

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge are know as what?


A) Elevation of privileges
B) Viruses
C) Hackers
D) Worms

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following governs the ethical and moral issues arising from the development and use of information technologies and the creation, collection, duplication, distribution, and processing of information?


A) Ethical information
B) Information technology
C) Information policies
D) Information ethics

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in its information security policies?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30 to 60 days
D) All of these

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Using one's social skills to trick people into revealing access credentials or other valuable information is called ______________.


A) Social engineering
B) Social media
C) Social viruses
D) Social processes

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

The ___________ of downtime is split into four categories: financial performance, revenue, damaged reputations, and other.

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and Social Security numbers.Angela and a co-worker decide to use the sensitive information to open credit cards in a few of her customer's names.This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 201 - 220 of 225

Related Exams

Show Answer