Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
What is it called when government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?
A. typosquatting
B. website name stealing
C. Internet censorship
D. teergrubing
Q:
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
A. typosquatting
B. website name stealing
C. internet censorship
D. teergrubing
Q:
What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?
A. cyberbullying
B. fair information practices
C. click-fraud
D. bring your own device
Q:
What is the electronic defacing of an existing website?
A. information bullying
B. cybervandalism
C. cookie
D. BYOD
Q:
What is cybervandalism?
A. the electronic defacing of an existing website
B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C. a computer crime where a competitor or disgruntled employee increases a companys search advertising costs by repeatedly clicking on the advertisers link
D. an act or object that poses a danger to assets
Q:
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
A. typosquatting
B. website name stealing
C. internet censorship
D. teergrubing
Q:
What is a threat?
A. the electronic defacing of an existing website
B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C. a computer crime where a competitor or disgruntled employee increases a companys search advertising costs by repeatedly clicking on the advertisers link
D. an act or object that poses a danger to assets
Q:
What is competitive click-fraud?
A. the electronic defacing of an existing website
B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C. a computer crime where a competitor or disgruntled employee increases a companys search advertising costs by repeatedly clicking on the advertisers link
D. an act or object that poses a danger to assets
Q:
What is click-fraud?
A. the electronic defacing of an existing website
B. the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C. a computer crime where a competitor or disgruntled employee increases a companys search advertising costs by repeatedly clicking on the advertisers link
D. an act or object that poses a danger to assets
Q:
What is an act or object that poses a danger to assets?
A. cyberbullying
B. threat
C. click-fraud
D. competitive click-fraud
Q:
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
A. cyberbullying
B. cybervandalism
C. click-fraud
D. competitive click-fraud
Q:
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
A. cyberbullying
B. cybervandalism
C. click-fraud
D. competitive click-fraud
Q:
Which of the following is one of the four basic options included in a bring your own device policy?
A. unlimited access for personal devices.
B. access only to nonsensitive systems and datA.
C. access, but preventing local storage of data on personal devices.
D. All of these are correct.
Q:
What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?
A. cyberbullying
B. fair information practices
C. click-fraud
D. bring your own device
Q:
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
A. cyberbullying
B. information vandalism
C. cookie
D. BYOD
Q:
Which of the following contains general principles to guide computer user behavior?
A. information technology code
B. technology policy
C. ethical computer use policy
D. information systems
Q:
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?
A. acceptable use policy
B. social media policy
C. information privacy policy
D. email privacy policy
Q:
According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.
A. informed; collaborate
B. consent; informed
C. informed; consent
D. consent; information
Q:
Which of the following choices is not one of the six epolicies that a company should implement for information protection as discussed in the text?
A. information privacy policy
B. workplace monitoring policy
C. acceptable use policy
D. downtime monitoring policy
Q:
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
A. information systems policy
B. epolicies
C. technology applied policy
D. emastery
Q:
What is information secrecy?
A. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
B. a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C. a masquerading attack that combines spam with spoofing
D. a phishing expedition in which the emails are carefully designed to target a particular person or organization
Q:
If an organization implemented only one policy, which one would it want to implement?
A. information privacy policy
B. acceptable use policy
C. internet use policy
D. ethical computer use policy
Q:
Which of the following is not considered an epolicy?
A. acceptable use policy
B. internet use policy
C. ethical computer use policy
D. anti-hacker use policy
Q:
What is the Child Online Protection Act? A. the unauthorized use, duplication, distribution, or sale of copyrighted software B. refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. passed to protect minors from accessing inappropriate material on the Internet D. a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Q:
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
A. information secrecy
B. phishing
C. phishing expedition
D. spear phishing
Q:
What is ediscovery? A. the unauthorized use, duplication, distribution, or sale of copyrighted software B.refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. passed to protect minors from accessing inappropriate material on the Internet D. a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Q:
What passed to protect minors from accessing inappropriate material on the Internet?
A. ediscovery
B. Child Online Protection Act
C. digital rights management
D. pirated software
Q:
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
A. ediscovery
B. Child Online Protection Act
C. digital rights management
D. pirated software
Q:
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?
A. eauthorization
B. emanagement
C. ediscovery
D. epolicies
Q:
Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
A. confidentiality
B. digital information
C. privacy policies
D. information ethics
Q:
Which of the choices below represents the definition of information compliance?
A. the act of conforming, acquiescing, or yielding information
B. the ability to comply with software
C. the understanding of technology
D. the verbalization of information governance in a companys policies and procedures
Q:
Which of the choices below represents the definition of information compliance?
A. the act of conforming, acquiescing, or yielding information
B. a method or system of government for information management or control
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Q:
Which of the choices below represents the definition of information management?
A. the act of conforming, acquiescing, or yielding information
B. a method or system of government for information management or control
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Q:
Which of the choices below represents the definition of information secrecy?
A. the act of conforming, acquiescing, or yielding information
B. a method or system of government for information management or control
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Q:
Which of the choices below represents the definition of information governance?
A. the act of conforming, acquiescing, or yielding information
B. a method or system of government for information management or control
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Q:
Which of the choices below represents the definition of information property?
A. an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B. a method or system of government for information management or control
C. the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D. examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Q:
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
A. information management
B. information compliance
C. information secrecy
D. information ethics
Q:
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?
A. information code
B. information technology
C. information management
D. information governance
Q:
What is the method or system of government for information management or control?
A. information management
B. information compliance
C. information governance
D. information secrecy
Q:
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.
A. legal and confidential
B. legal and ethical
C. legal and technical
D. confidential and open
Q:
Which of the following is included in the four quadrants of ethical and legal behavior?
A. legal behavior and ethical behavior.
B. illegal behavior and ethical behavior.
C. legal behavior and unethical behavior.
D. All of these are correct.
Q:
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?
A. quadrant IV
B. quadrants II and III
C. quadrant I
D. quadrant III
Q:
What is pirated software?
Q:
What is digital rights management? B. refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry C. passed to protect minors from accessing inappropriate material on the Internet a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Q:
As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristens responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively. What is Kristin overseeing for the company?
A. information codes
B. information management
C. information deployment
D. information security
Q:
What is the unauthorized use, duplication, distribution, or sale of copyrighted software? A. ediscovery B. Child Online Protection Act C. digital rights management D. pirated software
Q:
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A. ediscovery
B. Child Online Protection Act
C. digital rights management
D. pirated software
Q:
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
A. employees copying and distributing company-owned software
B. employees searching other employees private information without consent
C. employees intentionally creating or spreading viruses to confuse IT
D. All of these are correct.
Q:
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________. A. counterfeit software B. pirated software C. ethical software D. governance software
Q:
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A. digital rights management
B. counterfeit software
C. privacy
D. pirated software
Q:
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
A. safety
B. ethical standard
C. privacy
D. confidentiality
Q:
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
A. ethical information
B. information technology
C. information policies
D. information ethics
Q:
What is the difference between pirated and counterfeit software?
Q:
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
A. ethics
B. intellectual property
C. standards of living
D. security
Q:
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
A. contentment
B. ethical standard
C. confidentiality
D. firewall security
Q:
Trust between companies, customers, partners, and suppliers are the support structure of which of the following?
A. ebusiness
B. eharmony
C. esoftware
D. epolicies
Q:
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?
A. intellectual software
B.
C. trademark property
D. ethical property
Q:
Which of the following represents the two fundamental building blocks that protect organizational information?
A. security and sales
B. human resources and security
C. ethics and security
D. ethics and technology
Q:
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Q:
Identity theft is the forging of someone's identity for the purpose of frauD.
Q:
A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Q:
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Q:
A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
Q:
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
Q:
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
Q:
The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.
Q:
Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
Q:
Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
Q:
Multifactor authentication is the traditional security process, which requires a user name and passworD.
Q:
Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
Q:
Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
Q:
Single-factor authentication is the traditional security process, which requires a user name and passworD.
Q:
A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration of a speakers mouth and throat, can be expressed as a mathematical formulA. Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.
Q:
Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
Q:
To decrypt information is to decode it and is the opposite of encrypt.
Q:
Worms are computer viruses that wait for a specific date before executing their instructions.
Q:
A pharming attack uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack.
Q:
A zombie farm is a group of computers on which a hacker has planted zombie programs.
Q:
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
Q:
A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.