Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
To combat disasters, a company can create a ________ that would detail the process for recovering information or a system in the event of a catastrophic disaster.
A. disaster recovery plan
B. database lookup initiative
C. management recovery plan
D. tornado threat plan
Q:
What is a disaster recovery plan?
A. a separate and fully equipped facility where the company can move immediately after a disaster and resume business
B. a separate facility that does not have any computer equipment but is a place where employees can move after a disaster
C. a separate facility with computer equipment that requires installation and configuration
D. a detailed process for recovering information or a system in the event of a catastrophic disaster
Q:
Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane?
A. disrupting communications
B. damaging physical infrastructures
C. halting transportation
D. All of these are correct.
Q:
Which of the following questions would a company need to answer when first establishing a backup and recovery plan?
A. What types of storage mechanism will meet the needs of the company?
B. How often does the company need to back up its information?
C. What types of recovery systems does the company infrastructure need?
D. All of these are correct.
Q:
Which of the below offers a low-speed and low-cost backup method?
A. DVD
B. thumb drive
C. external hard drive
D. All of these are correct.
Q:
What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?
A. failure tolerance
B. recovery
C. reliability
D. capacity planning
Q:
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
A. white-hat hacker
B. black-hat hacker
C. cyberterrorists
D. script bunnies
Q:
Who are hackers with criminal intent?
A. crackers
B. black-hat hacker
C. hoaxes
D. cyberterrorists
Q:
What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?
A. splogs
B. adware
C. spygloss
D. CPU buzzer
Q:
What is software written with malicious intent to cause annoyance or damage?
A. elevation of privilege
B. spoofing
C. sniffer
D. virus
Q:
What is ransomware?
A. a form of malicious software that infects your computer and asks for money
B. a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C. software that allows Internet advertisers to display advertisements without the consent of the computer user
D. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
Q:
A DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?
A. data distribution of systems attack
B. data denial-of-software attack
C. distributed data online systems attack
D. distributed denial-of-service attack
Q:
What is a form of malicious software that infects your computer and asks for money?
A. sniffer
B. spyware
C. spoofware
D. ransomware
Q:
What is the primary difference between a worm and a virus?
A. a worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer
C. a virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D. All of these are correct.
Feedback: A virus must attach to something to spread, where a worm doesn't need to attach to anything to spread and can tunnel itself into the computer.
Q:
What is spyware?
A. a form of malicious software that infects your computer and asks for money
B. a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C. software that allows Internet advertisers to display advertisements without the consent of the computer user
D. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
Q:
What is adware?
A. a form of malicious software that infects your computer and asks for money
B. a new ransomware program that encrypts your personal files and demands payment for the files decryption keys
C. software that allows Internet advertisers to display advertisements without the consent of the computer user
D. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
Q:
Which of the following is the correct list of the six different types of hackers listed in your text?
A. black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B. black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C. black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D. None of these are correct.
Q:
What is a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission?
A. sniffer
B. spyware
C. spoofware
D. splog
Q:
What is a hacker who breaks into other peoples computer systems and may just look around or steal and destroy information?
A. script kiddies
B. black-hat hacker
C. white-hat hacker
D. cracker
Q:
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge, known as?
A. elevation of privilege
B. virus
C. hacker
D. worm
Q:
Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensens new task is to break into the computer system of one of HackersRUss top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?
A. cracker
B. white-hat hacker
C. script bunnies
D. black-hat hacker
Q:
What is adware?
A. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
B. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Q:
What is spyware?
A. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
B. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Q:
What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?
A. spyware
B. hacker
C. drive-by hacking
D. adware
Q:
What is a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission?
A. spyware
B. hacker
C. drive-by hacking
D. adware
Q:
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
A. spyware
B. hacker
C. drive-by hacking
D. adware
Q:
What is drive-by hacking?
A. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
B. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Q:
Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
A. backdoor programs
B. drive-by hacking
C. polymorphic viruses and worms
D. hacker
Q:
Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?
A. information spy
B. hacker
C. spyware
D. adware
Q:
What is information security?
A. a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
B. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
C. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Q:
What is a hacker?
A. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
B. experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C. a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D. software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Q:
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
A. information security
B. physical security
C. drive-by hacking
D. adware
Q:
Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?
A. fiscal responsibility
B. damaged reputation
C. other expenses
D. regeneration quadrant
Q:
Which of the following is a cost of downtime in addition to lost revenue?
A. per hour, per day, and per week
B. per employee, per computer, and per company
C. per stock, per stockholder, and per investment capital
D. None of these are correct.
Q:
Which of the following is a cost of downtime in addition to lost revenue?
A. legal expenses
B. loss in financial performance
C. damage to reputation
D. All of these are correct.
Q:
Which of the following is not an example of unplanned downtime?
A. power outages
B. tornados
C. a system upgrade
D. network failure
Q:
Which of the following refers to a period of time when a system is unavailable?
A. downtime
B. MIS down
C. direct data loss
D. downtown
Q:
Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
A. be as specific as possible stating when and what will be monitored
B. do not state the consequences of violating the policy
C. always enforce the policy the same for everyone
D. expressly communicate that the company reserves the right to monitor all employees
Q:
Which of the following definitions represents physical security?
A. a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B. tangible protection such as alarms, guards, fireproof doors, fences, and vaults
C. government attempts to control Internet traffic, thus preventing some material from being viewed by a countrys citizens
D. choosing to deny permission to incoming emails
Q:
Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?
A. social media monitoring
B. social media manager
C. social media policy
D. information privacy manager
Q:
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
A. social media monitoring
B. social media manager
C. social media policy
D. anti-spam policy
Q:
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
A. key logger
B. hardware key logger
C. cookie
D. adware
Q:
What is a program, when installed on a computer, records every keystroke and mouse click?
A. key logger software
B. spyware
C. cookie
D. adware
Q:
Which of the following describes workplace MIS monitoring?
A. tracking peoples activities by such measures as number of keystrokes
B. tracking peoples activities by such measures as error rate
C. tracking peoples activities by such measures as number of transactions processed
D. All of these are correct.
Q:
What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?
A. key logger
B. stealthware
C. clickstream
D. web log
Q:
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
A. spyware
B. web log
C. adware
D. hardware key logger
Q:
Which of the choices below is a common Internet monitoring technology?
A. key logger
B. hardware key logger
C. cookie
D. All of these are correct.
Q:
With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employees activities by measures such as keystrokes, error rate, and number of transactions processed?
A. anti-spam system
B. information intelligence system
C. workplace MIS monitoring
D. company technology monitoring
Q:
Which policy can protect a companys brand identity and outlines the corporate principles governing employee online communication?
A. an Internet workplace policy
B. a social media policy
C. a technology information policy
D. a YouTube policy
Q:
What outlines the corporate guidelines or principles governing employee online communications?
A. social media monitoring
B. social media manager
C. social media policy
D. information privacy manager
Q:
Which of the following defines opt in?
A. a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B. the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner
C. choosing to allow permission to incoming emails
D. choosing to deny permission to incoming emails
Q:
Which of the following defines opt out?
A. a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B. the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner
C. choosing to allow permission to incoming emails
D. choosing to deny permission to incoming emails
Q:
Which of the following defines teergrubing?
A. a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B. the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner
C. government attempts to control Internet traffic, thus preventing some material from being viewed by a countrys citizens
D. an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Q:
What occurs when a person chooses to deny permission to incoming emails?
A. opt out
B. website name stealing
C. Internet censorship
D. teergrubing
Q:
What is an anti-spamming approach whereby the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?
A. typosquatting
B. website name stealing
C. Internet censorship
D. nonrepudiation
Q:
What refers to choosing to allow permissions to incoming emails?
A. opt out
B. opt in
C. BYOD
D. nonrepudiation
Q:
What refers to denying permissions to incoming emails?
A. opt out
B. opt in
C. BYOD
D. nonrepudiation
Q:
What is a mail bomb?
A. sending a massive amount of email to a specific person or system resulting in filling up the recipients disk space
B. a contractual stipulation to ensure that ebusiness participants do not deny their online actions
C. sending a few emails to a specific person or system resulting in filling up the recipients disk space
D. a contractual stipulation to ensure that ebusiness participants deny their online actions
Q:
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
A. building a strong brand identity
B. protecting the company reputation through counter-damage control
C. engaging directly with customers and prospective customers
D. All of these are correct.
Q:
To find out your companys policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.
A. Internet use policy
B. social media policy
C. information use policy
D. employee monitoring policy
Q:
What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?
A. email privacy policy
B. spam policy and procedures
C. anti-spam policy
D. Internet user policy
Q:
What is unsolicited email that plagues employees at all levels and clogs email systems?
A. spyware
B. spam
C. adware
D. None of these are correct.
Q:
What sends massive amounts of email to a specific person or system that can cause that users server to stop functioning?
A. mail bomb
B. spam
C. intellectual spam
D. junk mail
Q:
Which of the following should be included in a company email privacy policy?
A. defines legitimate email users and explains what happens to accounts after a person leaves the organization
B. discourages sending junk email or spam to anyone who doesnt want to receive it
C. informs users that the organization has no control over email once it has been transmitted outside the organization
D. All of these are correct.
Q:
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.
A. the individual user
B. the company
C. the human resources department
D. the individual users department
Q:
What is one of the major problems with email?
A. intellectual property
B. nonrepudiation
C. users expectation of privacy
D. None of these are correct.
Q:
Which policy details the extent to which email messages may be read by others?
A. acceptable use policy
B. email privacy policy
C. internet use policy
D. All of these are correct.
Q:
Which of the following policies details the extent to which email messages may be read by others?
A. email privacy policy
B. email confidential policy
C. anti-spam policy
D. spam policy
Q:
Which of the following would you find in a typical Internet use policy?
A. user ramifications if the policy is violated
B. user responsibility for properly handling offensive material
C. user responsibility for protecting the companys good name
D. All of these are correct.
Q:
Which of the following definitions represents Internet censorship?
A. a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B. the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner
C. government attempts to control Internet traffic, thus preventing some material from being viewed by a countrys citizens
D. an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Q:
Which of the following definitions represents website name stealing?
A. a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B. the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner
C. government attempts to control Internet traffic, thus preventing some material from being viewed by a countrys citizens
D. an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Q:
Which of the following definitions represents typosquatting?
A. a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B. the theft of a websites name that occurs when someone, posing as a sites administrator, changes the ownership of the domain name assigned to the website to another website owner
C. government attempts to control Internet traffic, thus preventing some material from being viewed by a countrys citizens
D. an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Q:
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?
A. an information privacy policy
B. an email privacy policy
C. an Internet use policy
D. a workplace monitoring policy
Q:
What is one of the guidelines an organization can follow when creating an information privacy policy?
A. adoption and implementation of an anti-spam policy
B. notice and disclosure
C. choice and quality
D. None of these are correct.
Q:
Which of the following represents the classic example of unintentional information reuse?
A. phone number
B. social Security number
C. address
D. drivers license number
Q:
Which policy contains general principles regarding information privacy?
A. information privacy policy
B. acceptable use policy
C. internet use policy
D. anti-Spam policy
Q:
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?
A. compliance
B. noncommittal
C. nonrepudiation
D. erepudiation
Q:
Users would agree to all of the following in a typical acceptable use policy except ________.
A. not using the service as part of violating any law
B. not posting commercial messages to groups where the employee has received user consent
C. not performing any nonrepudiation
D. not attempting to break the security of any computer network
Q:
Which of the following clauses is typically contained in an acceptable use policy?
A. a nonrepudiation clause
B. a repudiation clause
C. a confidentiality clause
D. an employee use clause
Q:
Different organizations and countries have their own terms for fair information practices. Which of the following is correct?
A. The United Kingdom terms it "Data Protection."
B. The European Union terms it "Data Protection."
C. The United Kingdom terms it "Personal Data Privacy."
D. The United States terms it "Personal Data Privacy."