Filters
Question type

Study Flashcards

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?


A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal,pharming is illegal
B) Phishing is the right of the company,where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft,and pharming reroutes requests for legitimate websites to false websites
D) All of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) Splog
B) Adware
C) Spygloss
D) CPU buzzer

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent,detect,and remove known viruses,adware,and spyware?


A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords__________.

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Companies vary in how they expect employees to use computers;however,the overriding principle that needs to be included with these policies should include informed __________.

Correct Answer

verifed

verified

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

Correct Answer

verifed

verified

Authentication and authorization:Authent...

View Answer

Applications allowed to be placed on the corporate network,like IM software,and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?


A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A digital _____________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.

Correct Answer

verifed

verified

What refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

A(n)_______ is a program or device that can monitor data traveling over a network.

Correct Answer

verifed

verified

To find out your company policy regarding such websites as YouTube,Facebook,and Twitter you would have to refer to the ____________ policy.


A) Internet use policy
B) Social media policy
C) Information use policy
D) Employee monitoring policy

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 221 - 240 of 344

Related Exams

Show Answer