ISM3013 Quiz 4
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security
C.Freedom of speech, privacy
Cybercriminals can obtain the information they need in order to assume another person's identity by: A. Infiltrating an organization that stores large amounts of personal information. B. Phishing. C. Hacking into a corporate database. D. Stealing mail. E. All of the above are strategies to obtain information to assume another person's identity.
C.Hacking into corporate database
A _____ is intellectual work that is known only to a company and is not based on public information. A. copyright B. patent C. trade secret D. knowledge base E. private property
C.Trade secret
What is _____ is not necessarily _____. A. Illegal, unethical B. Ethical, illegal C. Unethical, illegal D. Unethical, legal E. Ethical, legal
C.Unethical, legal
______________ determines who is responsible for the actions taken. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability
D.Accountability
What is the relationship between advances in information technology and the practice of profiling? A. Advances in IT make it more difficult to profile individuals. B. Advances in IT have no impact on profiling. C. Advances in IT make it more expensive to profile individuals. D. Advances in IT make it easier to profile individuals.
D.Advances in IT make it easier to profile individuals
Which of the following is not a consequence of poor information security practices? A. Stolen information B. Stolen identities C. Financial loss D. Loss of service E. All of the above are consequences of poor information security practices.
E.All of the above are consequences of poor information security practices.
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability
E.Liability
The right of privacy is absolute. True False
False
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. A. Access B. Physical C. Data security D. Administrative E. Input
A.Access
Biometrics are an example of: A. something the user is. B. something the user wants. C. something the user has. D. something the user knows. E. something the user does.
A.Something the user is
Dumpster diving is always illegal because it involves trespassing on private property. True False
False
In general, employees have high legal protection against surveillance by employers. True False
False
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. True False
True
Human errors are a major cause of the security-related problems in many organizations. True False
True
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. True False
True
The computing skills necessary to be a hacker are decreasing. True False
True
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. True False
True
When you interview for a job at a company, it is likely that the company will Google your name and search social networking sites for information on you. True False
True