Filters
Question type

Study Flashcards

Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

A) True
B) False

Correct Answer

verifed

verified

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort,and he is faced with both physical and information security threats every month.Since the resort implemented a new software system,they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?


A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of these choices

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What is the Child Online Protection Act?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

When studying the figure of the four quadrants of ethical and legal behavior,the goal is for organizations to make decisions in which of the following quadrants?


A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is it called when a hacker looks through your trash to find personal information?


A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the below represents the definition of information management?


A) The act of conforming,acquiescing,or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

A smart card is a device,the size of a credit card that contains embedded technology that stores information and small amounts of software,and can act as __________________.


A) identification instruments
B) a form of digital cash
C) a data storage device
D) All of these choices

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A user can opt out to receive emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

The most secure procedures combine which of the following authentication and authorization techniques?


A) Something the user knows,such as a user ID and password
B) Something the user has,such as a smart card or token
C) Something that is part of the user,such as a fingerprint or voice signature
D) All of these choices

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of these choices

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username,password,and sometimes credit card information.

A) True
B) False

Correct Answer

verifed

verified

What are computer viruses that wait for a specific date before executing their instructions?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Pirated software is software that is manufactured to look like the real thing and sold as such.

A) True
B) False

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1)authentication and authorization,(2)prevention and resistance,and (3)detection and response.

Correct Answer

verifed

verified

Authentication and authorization: Authen...

View Answer

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of these choices

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

A) True
B) False

Correct Answer

verifed

verified

Script kiddies have criminal intent when hacking.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming,acquiescing,or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 181 - 200 of 333

Related Exams

Show Answer