Filters
Question type

Study Flashcards

_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.

Correct Answer

verifed

verified

Ethical computer use policy contains general principles to guide computer user behaviour.

A) True
B) False

Correct Answer

verifed

verified

A(n) information security ____________ details how an organization will implement the information security policies.

Correct Answer

verifed

verified

To facilitate information privacy, many countries have established __________________ to protect the collection and sharing of personal information.

Correct Answer

verifed

verified

_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

_________ is a contractual stipulation to ensure that e-business participants do not deny their online actions.

Correct Answer

verifed

verified

The purpose of PIPEDA is to provide Europeans with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization.

A) True
B) False

Correct Answer

verifed

verified

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A(n) _________ is software written with malicious intent to cause annoyance or damage.

Correct Answer

verifed

verified

Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.

Correct Answer

verifed

verified

Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?


A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Information privacy is about the prevention of collecting and sharing personal information.

A) True
B) False

Correct Answer

verifed

verified

How individuals behave toward each other, how they handle information, computer technologies, and information systems, are largely influenced by people's ethics.

A) True
B) False

Correct Answer

verifed

verified

The _________ act restricts what information the federal government can collect.

Correct Answer

verifed

verified

Which of the following is/are covered by Canada's Privacy Act:


A) medical records
B) security clearances
C) tax records
D) All of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not one of the three primary information security areas?


A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a program or device that can monitor data traveling over a network?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 171

Related Exams

Show Answer