Filters
Question type

Study Flashcards

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What scrambles information into an alternative form that requires a key or password to decrypt?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

With so much information and moving parts within a company,technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employee's activities by measures as keystrokes,error rate,and number of transaction processed?


A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the below would you find in a typical Internet use policy?


A) User ramifications if the policy is violated
B) User responsibility for properly handling offensive material
C) User responsibility for protecting the company's good name
D) All of the above

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What is a mail bomb?


A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal,pharming is illegal
B) Phishing is the right of the company,where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft,and pharming reroutes requests for legitimate websites to false websites
D) All of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following definitions represents opt-out?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
D) Choosing to deny permission to incoming emails.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys,one for public and one for private?


A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal
B) It is viewed as an invasion of privacy
C) It can be costly and intrusive
D) It requires constant monitoring and upgrading

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?


A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Companies vary in how they expect employees to use computers;however,the overriding principle that needs to be included with these policies should include informed __________.

Correct Answer

verifed

verified

_________ is unsolicited email.

Correct Answer

verifed

verified

What is phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Phishing
B) Authentication
C) Authorization
D) Programming

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

___________ attack computer systems by transmitting a virus hoax,with a real virus attached.

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents?


A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 81 - 100 of 342

Related Exams

Show Answer