bcis 2
What features full-time monitoring tools that search for patterns in network traffic to identify intruders?
Intrusion detection software
Which authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)?
multifactor
What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations? Multiple choice question.
network behavior analysis
The right to be Blank______ allows individuals to request to have all content that violates their privacy removed. Multiple choice question.
forgotten
Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment? Multiple choice question.
epolicies
What are the principles and standards that guide our behavior toward other people? Multiple choice question.
ethics
What is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings? Multiple choice question.
firewall
software that is intended to damage or disable computers and computer systems.
malware
Information ______ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
management
Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry. Multiple select question.
Electronic discovery Ediscovery
Select three items typically contained in a social media policy. Multiple select question.
Employee blog and personal blog policies. Employee Twitter, corporate Twitter, and personal Twitter policies. Employee social network and personal social network policies.
Select two accurate statements relating to an ethical computer use policy. Multiple select question.
Users need to be informed of the rules Users need to consent to following the rules
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed? Multiple choice question.
Workplace MIS monitoring
Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet?
acceptable use policy
Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet? Multiple choice question.
acceptable use policy
A(n) Blank______ policy simply states that email users will not send unsolicited emails.
anti spam
What scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware? Multiple choice question.
antivirus software
is a method for confirming users' identities. Multiple choice question.
authentication
What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?
authorization
is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. Multiple choice question.
biometrics
internet______ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens. Multiple choice question.
censorship
The Blank______ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. Multiple choice question.
child
Information Blank______ is the act of conforming, acquiescing, or yielding information. Multiple choice question.
compliance
What is the assurance that messages and information remain available only to those authorized to view them? Multiple choice question.
confidentiality
What occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information?
content filtering
______ is the legal protection afforded an expression of an idea, such as a song, book, or video game. Multiple choice question.
copyright
______ software is software that is manufactured to look like the real thing and sold as such.
counterfeit
What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals? Multiple choice question.
cyber terrorism
What type of attack is identity theft?
cyberattacks
includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website. Multiple choice question.
cyberbullying
______ is the electronic defacing of an existing website.
cybervandalism
What scrambles information into an alternative form that requires a key or password to decrypt? Multiple choice question.
encryption
What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines? Multiple choice question.
destructive agents
______ certificate is a data file that identifies individuals or organizations online and is comparable to a digital signature
digital
______ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
digital
What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals?
digital trust
What refers to a period of time when a system is unavailable? Multiple choice question.
downtime
Which privacy policy details the extent to which email messages may be read by others?
email privacy policy
______ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
information
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
information security
A(n) ______ use policy contains general principles to guide the proper use of the Internet. Multiple choice question.
internet
Select the area where you want to operate in terms of the intersection between what is ethical and what is legal. Multiple choice question.
legal and ethical
What is a user doing when they choose to allow permissions to incoming emails?
opt in
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?
patent
Organizations address security risks through two lines of defense; the first is Blank______ and the second is Blank______.
people and technology
What reroutes requests for legitimate websites to false websites? Multiple choice question.
pharming
What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?
physical security
______ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
pirated
What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
privacy
Information Blank______ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. Multiple choice question.
property
Intellectual ______ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. Multiple choice question.
property
What is a form of malicious software that infects your computer and asks for money? Multiple choice question.
ransomware
Information Blank______ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
secrecy
Through social Blank______, hackers use their social skills to trick people into revealing access credentials or other valuable information. Multiple choice question.
social engineering
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
social media monitoring
Which policy outlines the corporate guidelines or principles governing employee online communications? Multiple choice question.
social media policy
______ is unsolicited email.
spam
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? Multiple choice question.
spyware
A bring your own device (BYOD) policy allows employees to use their personal mobile devices and computers to access enterprise data and applications.
true
Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Rule 41 originally granted a federal judge magistrate the authority to issue a warrant to search and seize a person or property located within that judge's district if the person or property is part of a criminal investigation or trial. True false question.
true
The HIPAA Security Rule ensures national standards for securing patient data that is stored or transferred electronically. The HIPAA Security Rule requires the placement of both physical and electronic safeguards on sensitive PII health information. True false question.
true
Which authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)?
two factor