Filters
Question type

Study Flashcards

Which policy details the extent to which email messages may be read by others?


A) acceptable use policy
B) email privacy policy
C) internet use policy
D) All of these are correct.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?


A) cyberbullying
B) fair information practices
C) click-fraud
D) bring your own device

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) email privacy policy
B) email confidential policy
C) anti-spam policy
D) spam policy

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?


A) information spy
B) hacker
C) spyware
D) adware

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?


A) safety
B) ethical standard
C) privacy
D) confidentiality

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) compliance
B) noncommittal
C) nonrepudiation
D) erepudiation

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

A) True
B) False

Correct Answer

verifed

verified

What is the traditional security process that requires a user name and password?


A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) biometrics

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?


A) confidentiality
B) digital information
C) privacy policies
D) information ethics

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge, known as?


A) elevation of privilege
B) virus
C) hacker
D) worm

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?


A) ethical information
B) information technology
C) information policies
D) information ethics

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?


A) requiring computer users to log off before leaving for lunch
B) never sharing user or password information with anyone
C) changing passwords every 30-60 days
D) All of these are correct.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.


A) the individual user
B) the company
C) the human resources department
D) the individual user's department

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.

A) True
B) False

Correct Answer

verifed

verified

Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

What passed to protect minors from accessing inappropriate material on the Internet?


A) ediscovery
B) Child Online Protection Act
C) digital rights management
D) pirated software

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 121 - 140 of 331

Related Exams

Show Answer