Filters
Question type

Study Flashcards

A digital _____________ is a data file that identifies individuals or organisations online and is comparable to a digital signature.

Correct Answer

verifed

verified

Who/what are experts in technology who use their knowledge to break into computers and networks,for profit or just as a challenge known as?


A) Elevation of privilege
B) Virus
C) Hacker
D) Worm

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the biggest problem of information security breaches?


A) People misusing organisational information
B) Technology failures
C) Customers misusing organisational systems
D) Company departments missing sales goals

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Applications allowed to be placed on the corporate network (like IM software) and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policy?


A) Information ethics policy
B) Information security policy
C) Information technology plan
D) All of the answers are correct

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and _______.


A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

Which of the below would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any non-repudiation
D) Not attempting to break the security of any computer network

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What are the first two lines of defence a company should take when addressing security risks?


A) Technology first,customers second
B) Technology first,people second
C) Innovation first,technology second
D) People first,technology second

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

_________ occur when business data flows across international boundaries over the telecommunications networks of global information systems.

Correct Answer

verifed

verified

Transborde...

View Answer

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defence against information security attacks?


A) Authentication and authorisation,prevention and resistance,prevention and response
B) Authentication and authorisation,prevention and response,detection and response
C) Analysing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorisation,prevention and resistance,detection and response

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Janet is a financial aid counsellor at a local community TAFE,and she shares an office with her three co-workers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realising it,Janet is creating the potential for which type of information security breach to occur?


A) Insiders to hack into the TAFE system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of the answers are correct

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following is not considered a form of biometrics?


A) Iris scan
B) Password
C) Fingerprint
D) Handwriting

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

____________ concerns the interest of a person to protect their life from unwanted intrusion and public scrutiny.

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea,such as a song,book or video game.

A) True
B) False

Correct Answer

verifed

verified

Which of the below should be included in a company email privacy policy?


A) Defines who legitimate email users are
B) Explains what happens if the user severs his or her connection with the organisation
C) Informs users that the organisation has no control over email once it is transmitted outside the organisation
D) All of the answers are correct

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of the answers are correct

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 21 - 40 of 80

Related Exams

Show Answer