Filters
Question type

Study Flashcards

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the two fundamental building blocks that protect organizational information?


A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology

E) None of the above
F) All of the above

Correct Answer

verifed

verified

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ____________ policy.


A) Internet use policy
B) Social media policy
C) Information use policy
D) Employee monitoring policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Information security is a high priority for protection of the company's information, and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

The protection of customers' privacy is one of the largest ethical issues for corporations today._____________ is the right to be left alone when you want to be and to have control over your personal possessions.

Correct Answer

verifed

verified

Through social ____________, hackers use their social skills to trick people into revealing access credentials or other valuable information.

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.


A) The individual user
B) The company
C) The human resources department
D) The individual user's department

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information ethics

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

If an organization implemented only one policy, which one would it want to implement?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A ________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

Correct Answer

verifed

verified

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

Correct Answer

verifed

verified

The ___________ Bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.

Correct Answer

verifed

verified

Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords __________.

Correct Answer

verifed

verified

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 81 - 100 of 225

Related Exams

Show Answer