Filters
Question type

Study Flashcards

Which of the below is not included as a common stipulation an organisation would follow when creating an employee monitoring policy?


A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In the information technology world,which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the answers are correct

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which Act protects investors by improving the accuracy and reliability of corporate disclosures?


A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the answers is correct

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues.For example,imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course,this email is not actually from eBay and,as soon as you log,in your information is set to be stolen.What type of information security breach would you consider this to be?


A) An insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Personal information is information that identifies,or could be used to identify,an individual.

A) True
B) False

Correct Answer

verifed

verified

Through social ___________,hackers use their social skills to trick people into revealing access credentials or other valuable information.

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?


A) Interconnected data software (IDS)
B) Intrusion-detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

The three primary information security areas are: (1)authentication and authorisation; (2)policies and rewards; and (3)detection and response.

A) True
B) False

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behaviour.

A) True
B) False

Correct Answer

verifed

verified

Ethics,privacy and security are fundamental building blocks for all organisations.

A) True
B) False

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) e-Discovery
D) All of the answers are correct

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs,a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in its information security policy?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 60 days
D) All of the answers are correct

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread; whereas,a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person; whereas,a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread; whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the answers are correct

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

Information security policies detail how an organisation is going to implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statement is correct?


A) Personal information on the internet can have unexpected spectators.
B) Personal information is information that identifies,or could be used to identify,an individual.
C) The obligation of an organisation to balance the commercial use of personal information with ensuring such use is ethical is one affecting many businesses today.
D) All of the answers are correct

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information ethics

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 80

Related Exams

Show Answer