ISM3013 Quiz 4

Ace your homework & exams now with Quizwiz!

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security

C.Freedom of speech, privacy

Cybercriminals can obtain the information they need in order to assume another person's identity by: A. Infiltrating an organization that stores large amounts of personal information. B. Phishing. C. Hacking into a corporate database. D. Stealing mail. E. All of the above are strategies to obtain information to assume another person's identity.

C.Hacking into corporate database

A _____ is intellectual work that is known only to a company and is not based on public information. A. copyright B. patent C. trade secret D. knowledge base E. private property

C.Trade secret

What is _____ is not necessarily _____. A. Illegal, unethical B. Ethical, illegal C. Unethical, illegal D. Unethical, legal E. Ethical, legal

C.Unethical, legal

______________ determines who is responsible for the actions taken. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability

D.Accountability

What is the relationship between advances in information technology and the practice of profiling? A. Advances in IT make it more difficult to profile individuals. B. Advances in IT have no impact on profiling. C. Advances in IT make it more expensive to profile individuals. D. Advances in IT make it easier to profile individuals.

D.Advances in IT make it easier to profile individuals

Which of the following is not a consequence of poor information security practices? A. Stolen information B. Stolen identities C. Financial loss D. Loss of service E. All of the above are consequences of poor information security practices.

E.All of the above are consequences of poor information security practices.

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability

E.Liability

The right of privacy is absolute. True False

False

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. A. Access B. Physical C. Data security D. Administrative E. Input

A.Access

Biometrics are an example of: A. something the user is. B. something the user wants. C. something the user has. D. something the user knows. E. something the user does.

A.Something the user is

Dumpster diving is always illegal because it involves trespassing on private property. True False

False

In general, employees have high legal protection against surveillance by employers. True False

False

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. True False

True

Human errors are a major cause of the security-related problems in many organizations. True False

True

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. True False

True

The computing skills necessary to be a hacker are decreasing. True False

True

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. True False

True

When you interview for a job at a company, it is likely that the company will Google your name and search social networking sites for information on you. True False

True


Related study sets

Partnership Law (Obligations of Partners with Regard to Third Persons Ch. 2 - Sec. 3)

View Set

BUS 187 FINAL EXAM 12-20 REVIEW QUESTIONS

View Set

Psychology 120 Chapter 9 Thinking and Intelligence

View Set

M 5.7- Measurement of Blood Pressure

View Set