Filters
Question type

Study Flashcards

Information compliance is the act of conforming, acquiescing, or yielding information.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the definition of information management?


A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the two fundamental building blocks that protect organizational information?


A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Backdoor programs open a way into the network for future attacks.

A) True
B) False

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?


A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is adware?


A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a bug bounty program?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A worm spreads itself not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

A) True
B) False

Correct Answer

verifed

verified

What is spyware?


A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not an example of unplanned system downtime?


A) Power outages
B) Tornadoes
C) A system upgrade
D) Network failure

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

A) True
B) False

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?


A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of these

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

A) True
B) False

Correct Answer

verifed

verified

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is pirated software?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following changes its form as it propagates?


A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 61 - 80 of 132

Related Exams

Show Answer