Information Management System Chapter 13 Quiz
- Question 1
0.5 out of 0.5 points
When company employees fail to realize the importance of the information written down and toss the paperwork in the garbage without shredding, it sets the company up to possibly intrusion due to: | |||||||||||||
|
- Question 2
0.5 out of 0.5 points
The practice of sending extremely critical, derogatory e-mail messages or newsgroup postings to other users on the Internet is called _______________.
|
|||||||||||||
|
- Question 3
0.5 out of 0.5 points
A _______________ is software that can guess passwords. | |||||||||||||
|
- Question 4
0.5 out of 0.5 points
_______________ is/are the most commonly used security technology at large companies. | |||||||||||||
|
- Question 5
0.5 out of 0.5 points
One way hackers gain access to an individual’s information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________. | |||||||||||||
|
- Question 6
0.5 out of 0.5 points
Which one of the following would NOT be considered as a way that a computer virus can enter a computer system? | |||||||||||||
|
- Question 7
0.5 out of 0.5 points
Denial of service attacks are: | |||||||||||||
|
- Question 8
0.5 out of 0.5 points
Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection is a description of which of the following hacking tactics used to assault companies through the Internet and other networks? | |||||||||||||
|
- Question 9
0.5 out of 0.5 points
Your text describes firewalls as: | |||||||||||||
|
- Question 10
0.5 out of 0.5 points
Software that employs users’ Internet connections in the background without their knowledge or explicit permission to collect specific information about you, ranging from general demographics such as name, address, credit card numbers, passwords and other personal information is: | |||||||||||||
|
- Question 11
0.5 out of 0.5 points
Your text describes encryption as: | |||||||||||||
|
- Question 12
0.5 out of 0.5 points
The goal of security management is: | |||||||||||||
|
- Question 13
0.5 out of 0.5 points
Individuals have been mistakenly arrested and jailed and people have been denied credit because of their physical profiles. These are often results of: | |||||||||||||
|
- Question 14
0.5 out of 0.5 points
The development of __________________ has lead to the violation of intellectual property rights held by musicians due to illegal coping of music. | |||||||||||||
|
- Question 15
0.5 out of 0.5 points
Concerning the issue of opt-in or opt-out: | |||||||||||||
|
- Question 16
0.5 out of 0.5 points
Your text defines flaming as the: | |||||||||||||
|
- Question 17
0.5 out of 0.5 points
_______________ refers to sifting through a company’s garbage to find information to help break into their computers. | |||||||||||||
|
- Question 18
0.5 out of 0.5 points
Using fake email or websites to gather personal information is called: | |||||||||||||
|
- Question 19
0.5 out of 0.5 points
Why is computer monitoring being criticized as an invasion of the privacy of employment? | |||||||||||||
|
- Question 20
0.5 out of 0.5 points
Hacking, in computerese is the obsessive use of computers or the unauthorized access and use of networked computer systems. Which of the following is NOT considered a hacker? | |||||||||||||
|