Filters
Question type

Study Flashcards

What identifies the rules required to maintain information security?


A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Correct Answer

verifed

verified

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

Correct Answer

verifed

verified

_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

An organization should implement information security lines of defence through people first and technology second.

A) True
B) False

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of these

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

The gist of the 10 Guiding Principles of PIPEDA for organizations can be remembered as the 3Cs: consent, choice, and __________.

Correct Answer

verifed

verified

Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.

Correct Answer

verifed

verified

Different monitoring technologies includ...

View Answer

What is the most secure type of authentication?


A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) Combination of all of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.

Correct Answer

verifed

verified

What is the most common type of defence within detection and response technologies?


A) Malicious code
B) Token
C) User ID
D) Antivirus software

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Insurance Number
C) Address
D) Driver's license number

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which is a virus that opens a way into the network for future attacks?


A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.


A) informed; collaborate
B) consent; informed
C) informed; consent
D) None of these

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

_________ is a contractual stipulation to ensure that e-business participants do not deny their online actions.

Correct Answer

verifed

verified

Key logger or key trapper software is a(n) __________ that when installed on a computer, records every keystroke and mouse click.

Correct Answer

verifed

verified

__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.

Correct Answer

verifed

verified

What is a program, when installed on a computer, records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is fault tolerance?


A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Denial-of-service attack (DoS) _______________ a website with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

Showing 141 - 160 of 200

Related Exams

Show Answer