Filters
Question type

Study Flashcards

Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.

Correct Answer

verifed

verified

What was the primary problem Saab encountered with one of its marketing companies?


A) Contacted customers based on opt-out decision
B) Contacted customers based on opt-in decision
C) Contacted customers regardless of their opt-out or opt-in decision
D) Failed to contact any customers

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Describe the relationship between ethics and privacy.

Correct Answer

verifed

verified

Ethics are the principles and standards ...

View Answer

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

Information technology monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?


A) Biometrics
B) Encryption
C) Firewalls
D) Content Filtering

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What includes a variety of threats such as viruses,worms,and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A(n)__________ use policy contains general principles to guide the proper use of the Internet.

Correct Answer

verifed

verified

Breaches in information privacy occur when proper disclosure of personal information are made.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not one of the five steps for creating an information security plan?


A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Identify the differences between an ethical computer use policy and an acceptable computer use policy.

Correct Answer

verifed

verified

Ethical computer use policy-contains gen...

View Answer

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not one of the three primary information security areas?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is a program,when installed on a computer,records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Information technology _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

Correct Answer

verifed

verified

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?


A) Hactivist
B) Social engineering
C) Insiders
D) Virus

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A(n)___________ privacy policy contains general principles regarding information privacy.

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Authentication
B) Prevention
C) Detection
D) Response

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The pre-cursor to the Personal Information Protection and Electronic Documents Act (PIPEDA)was the _____________ Act.

Correct Answer

verifed

verified

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?


A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 171

Related Exams

Show Answer