Filters
Question type

Study Flashcards

Trust between companies, customers, partners, and suppliers is the support structure of which of the following?


A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

A) True
B) False

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

A) True
B) False

Correct Answer

verifed

verified

A DDoS stands for one of the common forms of viruses that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?


A) Data distribution of systems attack.
B) Data denial-of-software attack.
C) Distributed data online systems attack.
D) Distributed denial-of-service attack.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D) The principles and standards that guide our behavior toward other people.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?


A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

C

Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?


A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information secrecy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is ediscovery?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) A law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

What is simplelocker?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

B

Which of the following represents the definition of information property?


A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

A) True
B) False

Correct Answer

verifed

verified

Describe the relationship between ethics and privacy.

Correct Answer

verifed

verified

Ethics are the principles and standards ...

View Answer

What is spyware?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

D

Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 121

Related Exams

Show Answer