MIS chapter 4

5.0 (1 review)
Get a hint
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
a. Malicious code
b. Hoaxes
c. Spoofing
d. Sniffer
Click the card to flip 👆
1 / 32
1 / 32
Terms in this set (32)
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
a. Malicious code
b. Hoaxes
c. Spoofing
d. Sniffer
b. Hoaxes
Which of the following describes confidentiality?
a. The assurance that messages and information are available only to those who are authorized to view them
b. Policies and procedures that address the ethical use of computers and Internet usage in the business environment
c. The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
d. The principles and standards that guide our behavior toward other people
a. The assurance that messages and information are available only to those who are authorized to view them
Which of the following is not considered an epolicy?
a. Acceptable use policy
b. Internet use policy
c. Ethical computer use policy
d. Anti-hacker use policy
d. Anti-hacker use policy
Which act strengthened criminal laws against identity theft?
a. Bork Bill
b. Sarbanes-Oxley Act
c. Cable Communications Act
d. None of the above
d. None of the above
What identifies the rules required to maintain information security?
a. Information security plan
b. Information security policies
c. Authentication
d. Biometrics
b. Information security policies
What is encryption?
a. Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
b. Scrambles information into an alternative form that requires a key or password to decrypt the information
c. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
d. A form of unsolicited email
b. Scrambles information into an alternative form that requires a key or password to decrypt the information
Which policy details the extent to which email messages may be read by others?
a. Acceptable use policy
b. Email privacy policy
c. Internet use policy
d. None of the above
b. Email privacy policy
What is one of the major problems with email?
a. Intellectual property
b. Nonrepudiation
c. User's expectation of privacy
d. None of the above
c. User's expectation of privacy
Which of the following describes epolicies?
a. The assurance that messages and data are available only to those who are authorized to view them.
b. Policies and procedures that address the ethical use of computers and Internet usage in the business environment
c. The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
d. The principles and standards that guide our behavior toward other people
b. Policies and procedures that address the ethical use of computers and Internet usage in the business environment
True/False
Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.
True
Which of the following is not one of the five steps for creating an information security plan?
a. Develop the information security policies
b. Communicate the information security policies
c. Revise and test the information security policies
d. Test and reevaluate risks
c. Revise and test the information security policies
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
a. Copyright
b. Fair use doctrine
c. Nonrepudiation
d. Intellectual property
c. Nonrepudiation
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
a. White-hat hacker
b. Black-hat hacker
c. Crackers
d. Cyberterrorists
d. Cyberterrorists
Which of the following is included in the four quadrants of ethical and legal behavior?
a. Legal behavior and ethical behavior
b. Illegal behavior and ethical behavior
c. Legal behavior and unethical behavior
d. All of the above
d. All of the above
True/False
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
False