Filters
Question type

Study Flashcards

Define backup and recovery and explain the importance of the disaster recovery cost curve to an organization.

Correct Answer

verifed

verified

Backup is an exact copy of a system's in...

View Answer

What is the policy that contains general principles to guide computer user behaviour?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Smart card is a(n) _______ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.

Correct Answer

verifed

verified

A(n) information security ____________ details how an organization will implement the information security policies.

Correct Answer

verifed

verified

The purpose of PIPEDA is to provide Europeans with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization.

A) True
B) False

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Hardware key logger
C) Cookie
D) Adware

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What attacks computer systems by transmitting a virus hoax, with a real virus attached?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following is a type of backup/recovery media?


A) DVD
B) Tape
C) Disk
D) All of these

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behaviour toward other people

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?


A) Ethics
B) ePolicies
C) All of these
D) None of these

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which policy typically contains a nonrepudiation clause?


A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

Correct Answer

verifed

verified

Which of the following is part of the acceptable use policy stipulations?


A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of these

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Who breaks into other people's computer systems and just looks around or steals and destroys information?


A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the ideal type of decisions for people in an organization to make?


A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following describes information technology monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Managing ___________ access to information is a critical piece of the data architecture.

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 200

Related Exams

Show Answer