Filters
Question type

Study Flashcards

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

What is a contractual stipulation that ensures that e-business participants do not deny their online actions?


A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Identify the differences between an ethical computer use policy and an acceptable computer use policy.

Correct Answer

verifed

verified

Ethical computer use policy-contains gen...

View Answer

_______________ is a hacker with criminal intent.

Correct Answer

verifed

verified

A(n) _______ is a program or device that can monitor data traveling over a network.

Correct Answer

verifed

verified

Social engineering means using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.

Correct Answer

verifed

verified

Denial-of-service attack (DoS) _______________ a Web site with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

Summarize the five steps to creating an information security plan.

Correct Answer

verifed

verified

Develop the information security policie...

View Answer

What is a program, when installed on a computer, records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

___________ attack computer systems by transmitting a virus hoax, with a real virus attached.

Correct Answer

verifed

verified

The pre-cursor to the Personal Information Protection and Electronic Documents Act (PIPEDA) was the _____________ Act.

Correct Answer

verifed

verified

Showing 161 - 171 of 171

Related Exams

Show Answer