Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Virus
C) Hacker
D) Worm
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) People misusing organisational information
B) Technology failures
C) Customers misusing organisational systems
D) Company departments missing sales goals
Correct Answer
verified
Multiple Choice
A) Information ethics policy
B) Information security policy
C) Information technology plan
D) All of the answers are correct
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any non-repudiation
D) Not attempting to break the security of any computer network
Correct Answer
verified
Multiple Choice
A) Technology first,customers second
B) Technology first,people second
C) Innovation first,technology second
D) People first,technology second
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Authentication and authorisation,prevention and resistance,prevention and response
B) Authentication and authorisation,prevention and response,detection and response
C) Analysing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorisation,prevention and resistance,detection and response
Correct Answer
verified
Multiple Choice
A) Insiders to hack into the TAFE system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of the answers are correct
Correct Answer
verified
Multiple Choice
A) Iris scan
B) Password
C) Fingerprint
D) Handwriting
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Defines who legitimate email users are
B) Explains what happens if the user severs his or her connection with the organisation
C) Informs users that the organisation has no control over email once it is transmitted outside the organisation
D) All of the answers are correct
Correct Answer
verified
Multiple Choice
A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of the answers are correct
Correct Answer
verified
Showing 21 - 40 of 80
Related Exams