Filters
Question type

Study Flashcards

Which of the following is not one of the five steps for creating an information security plan?


A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Identify the differences between an ethical computer use policy and an acceptable computer use policy.

Correct Answer

verifed

verified

Ethical computer use policy-contains gen...

View Answer

What is it called when you may use copyrighted material in certain situations-for example, in the creation of new work or, within certain limits, for teaching purposes?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair dealing

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

What is encryption?


A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited email

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

An organization should implement information security lines of defence through _____ first and technology second.

Correct Answer

verifed

verified

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

Correct Answer

verifed

verified

To facilitate information privacy, many countries have established __________________ to protect the collection and sharing of personal information.

Correct Answer

verifed

verified

________ is a U.S. federal law established in 1998 that applies to collectingpersonal information from American children who are under 13 years of age.


A) HIPAA
B) COPPA
C) PIPEDA
D) None of these

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

What are the principles and standards that guide our behaviour toward other people?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

Organizations should not choose a backup and recovery strategy that is in line with its business goals

A) True
B) False

Correct Answer

verifed

verified

Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

Correct Answer

verifed

verified

Ethical computer use policy contains general principles to guide computer user behaviour.

A) True
B) False

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is spam?


A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of these

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Showing 121 - 140 of 200

Related Exams

Show Answer