bcis 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What features full-time monitoring tools that search for patterns in network traffic to identify intruders?

Intrusion detection software

Which authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)?

multifactor

What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations? Multiple choice question.

network behavior analysis

The right to be Blank______ allows individuals to request to have all content that violates their privacy removed. Multiple choice question.

forgotten

Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment? Multiple choice question.

epolicies

What are the principles and standards that guide our behavior toward other people? Multiple choice question.

ethics

What is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings? Multiple choice question.

firewall

software that is intended to damage or disable computers and computer systems.

malware

Information ______ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

management

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry. Multiple select question.

Electronic discovery Ediscovery

Select three items typically contained in a social media policy. Multiple select question.

Employee blog and personal blog policies. Employee Twitter, corporate Twitter, and personal Twitter policies. Employee social network and personal social network policies.

Select two accurate statements relating to an ethical computer use policy. Multiple select question.

Users need to be informed of the rules Users need to consent to following the rules

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed? Multiple choice question.

Workplace MIS monitoring

Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet?

acceptable use policy

Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet? Multiple choice question.

acceptable use policy

A(n) Blank______ policy simply states that email users will not send unsolicited emails.

anti spam

What scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware? Multiple choice question.

antivirus software

is a method for confirming users' identities. Multiple choice question.

authentication

What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

authorization

is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. Multiple choice question.

biometrics

internet______ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens. Multiple choice question.

censorship

The Blank______ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. Multiple choice question.

child

Information Blank______ is the act of conforming, acquiescing, or yielding information. Multiple choice question.

compliance

What is the assurance that messages and information remain available only to those authorized to view them? Multiple choice question.

confidentiality

What occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information?

content filtering

______ is the legal protection afforded an expression of an idea, such as a song, book, or video game. Multiple choice question.

copyright

______ software is software that is manufactured to look like the real thing and sold as such.

counterfeit

What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals? Multiple choice question.

cyber terrorism

What type of attack is identity theft?

cyberattacks

includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website. Multiple choice question.

cyberbullying

______ is the electronic defacing of an existing website.

cybervandalism

What scrambles information into an alternative form that requires a key or password to decrypt? Multiple choice question.

encryption

What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines? Multiple choice question.

destructive agents

______ certificate is a data file that identifies individuals or organizations online and is comparable to a digital signature

digital

______ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

digital

What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals?

digital trust

What refers to a period of time when a system is unavailable? Multiple choice question.

downtime

Which privacy policy details the extent to which email messages may be read by others?

email privacy policy

______ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

information

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

information security

A(n) ______ use policy contains general principles to guide the proper use of the Internet. Multiple choice question.

internet

Select the area where you want to operate in terms of the intersection between what is ethical and what is legal. Multiple choice question.

legal and ethical

What is a user doing when they choose to allow permissions to incoming emails?

opt in

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

patent

Organizations address security risks through two lines of defense; the first is Blank______ and the second is Blank______.

people and technology

What reroutes requests for legitimate websites to false websites? Multiple choice question.

pharming

What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?

physical security

______ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

pirated

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

privacy

Information Blank______ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. Multiple choice question.

property

Intellectual ______ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. Multiple choice question.

property

What is a form of malicious software that infects your computer and asks for money? Multiple choice question.

ransomware

Information Blank______ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

secrecy

Through social Blank______, hackers use their social skills to trick people into revealing access credentials or other valuable information. Multiple choice question.

social engineering

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

social media monitoring

Which policy outlines the corporate guidelines or principles governing employee online communications? Multiple choice question.

social media policy

______ is unsolicited email.

spam

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? Multiple choice question.

spyware

A bring your own device (BYOD) policy allows employees to use their personal mobile devices and computers to access enterprise data and applications.

true

Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Rule 41 originally granted a federal judge magistrate the authority to issue a warrant to search and seize a person or property located within that judge's district if the person or property is part of a criminal investigation or trial. True false question.

true

The HIPAA Security Rule ensures national standards for securing patient data that is stored or transferred electronically. The HIPAA Security Rule requires the placement of both physical and electronic safeguards on sensitive PII health information. True false question.

true

Which authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)?

two factor


Ensembles d'études connexes

Anatomy - Chapter 18: Cardiovascular System

View Set

ap psych unit 6 review questions

View Set

Section 7, Unit 5: PITI Workshop and Practice

View Set

FIL 190 Chapters 1-4 Exam 1 MC Study Guide

View Set

Information Systems Security Midterm Review

View Set

11. 2 Designing the Business Model

View Set

4 - Peritoneum and Upper Abdominal

View Set

ACC 202 Exam 2 Break-Out Questions

View Set

Mucosa cells: Function and location

View Set

Chapter 4: Cell Injury, Aging, and Death

View Set