Filters
Question type

Study Flashcards

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

B

Who works at the request of the system owners to find system vulnerabilities and plug the holes?


A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.


A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

To facilitate information privacy,many countries have established __________________ to protect the collection and sharing of personal information.

Correct Answer

verifed

verified

Which of the following is an effect of employee monitoring?


A) Employee absenteeism is on the rise.
B) Job satisfaction is on the rise.
C) Psychological reactance is prevented.
D) All of the above.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how,when,and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

True

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

A(n)____________ privacy policy details the extent to which e-mail messages may be read by others.

Correct Answer

verifed

verified

Which of the following is not a part of the e-mail privacy policy stipulations?


A) It defines who legitimate e-mail users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's e-mail
D) It informs people that the organization has full control over e-mail once it is transmitted outside the organization

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not considered an ePolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) None of the above

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

_____________ is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents.

Correct Answer

verifed

verified

Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.

Correct Answer

verifed

verified

Develop the information security policies is the ________________ step for creating an information security plan.

Correct Answer

verifed

verified

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

Correct Answer

verifed

verified

Who breaks into other people's computer systems and just looks around or steals and destroys information?


A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

Ethical concerns over ______________ monitoring occurs when the monitoring is unprecedented or overly intrusive

Correct Answer

verifed

verified

employee

A(n)__________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.

Correct Answer

verifed

verified

Which of the following is part of the acceptable use policy stipulations?


A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of the above

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is the most common type of defence within detection and response technologies?


A) Malicious code
B) Token
C) User ID
D) Antivirus software

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 171

Related Exams

Show Answer