Filters
Question type

Study Flashcards

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is spyware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________.


A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

A) True
B) False

Correct Answer

verifed

verified

What is adware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is information security?


A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is drive-by hacking?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

A) True
B) False

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?


A) Information code
B) Information technology
C) Information management
D) Information governance

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

A) True
B) False

Correct Answer

verifed

verified

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?


A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?


A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A worm spreads itself not only from file to file but also from computer to computer.

A) True
B) False

Correct Answer

verifed

verified

What is malware?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

As the president of a local trade company, Lisa is faced with leadership, ethical, and operational decisions on a daily basis. Lisa's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Lisa overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?


A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 60 of 132

Related Exams

Show Answer