Filters
Question type

Study Flashcards

Which of the following is not an example of unplanned downtime?


A) Power outages
B) Tornados
C) A system upgrade
D) Network failure

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following are all common forms of viruses?


A) Packet tampering,worms,cakes,and Trojan viruses
B) Polymorphic,sniffer,splogs,and Denial-of-service viruses
C) Backdoor program,worm,Trojan-horse viruses
D) All of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

As the President of a local trade company,Kristin is faced with leadership,ethical,and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions,uses,value,and distribution ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

Cyberbullying is an act or object that poses a danger to assets.

A) True
B) False

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data or information required to function,and grow effectively?


A) Information code
B) Information technology
C) Information management
D) Information governance

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?


A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

Correct Answer

verifed

verified

Information ___________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.

A) True
B) False

Correct Answer

verifed

verified

Included in the information security policy,managers should consider including virus protection,which includes how often the system should be scanned and how frequently the software should be __________.

Correct Answer

verifed

verified

The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?


A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What occurs when a person chooses to deny permission to incoming emails?


A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

A company should be able to calculate the cost of downtime by which of the following?


A) Per hour,per day,and per week
B) Per employee,per computer,and per company
C) Per stock,per stockholder,and per investment capital
D) None of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

_____________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.

Correct Answer

verifed

verified

__________ is the electronic defacing of an existing website.

Correct Answer

verifed

verified

Cybervandalism or Cy...

View Answer

Showing 241 - 260 of 342

Related Exams

Show Answer