Deck 15: HRIS Privacy and Security

ملء الشاشة (f)
exit full mode
سؤال
______ are best described as people who accesses a computer or computer network unlawfully.

A) Hackers
B) Viruses, worms, and trojans
C) Information thieves
D) Disgruntled employees
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of these is NOT a well-known "worm" threat?

A) Slammer
B) Code Red
C) MyDoom
D) MyPirate
سؤال
Which of the following is NOT considered a software threat to security?

A) worms
B) spyware
C) trojan virus
D) file corruption
سؤال
Human error and natural disasters are not considered viable threats to employee privacy and data security.
سؤال
Which of the following is NOT considered a threat to security?

A) human error
B) disgruntled employees and ex-employees
C) other "internal" attackers
D) none of these
سؤال
Integrity ensures that information is created and modified in an authorized manner.
سؤال
Which type of security threat is the most widespread,affecting almost 90% of companies?

A) computer fraud
B) phishing
C) denial of service
D) theft of hardware components, such as storage cards
سؤال
According to the text,approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A) 25%
B) 30%
C) 75%
D) 100%
سؤال
Which of the following is NOT a recommended privacy policy statement?

A) Adopt a comprehensive information security and privacy policy.
B) Store sensitive personal data in secure HRIS, and provide appropriate encryption.
C) Dispose of documents properly, or restore persistent storage equipment.
D) Conduct focus groups with selected employees.
سؤال
Which is NOT a symptom of spyware on an employee's computer?

A) invasion of privacy
B) appropriation of personal information
C) interference with the speed and responsiveness of the computer
D) proliferation of pop-up ads
سؤال
A hacker is defined as someone who accesses a computer or computer network unlawfully.
سؤال
Which state has passed a law protecting employee records in private organizations?

A) California
B) Ohio
C) New York
D) Oregon
سؤال
Phishing is known as the illegal scheme where victims usually receive e-mail messages that appear to come from an authentic source with which the victim does business.
سؤال
The McCumber Cube for Data Privacy has three dimensions.Which of the following is NOT a dimension that is used to organize a privacy policy?

A) desired information goals
B) countermeasures
C) state of information
D) use of information
سؤال
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A) Train users on how to securely use and handle the equipment, data, and software.
B) Make backup copies of data files and programs.
C) Do not allow passwords to be shared. Change passwords frequently.
D) Require employees to take sensitive material home with them so that it is not left at the office.
سؤال
Information security breaches cost approximately ______ annually.

A) $78 million
B) $45 billion
C) $10 billion
D) $100 billion
سؤال
Which of the following is considered a common security threat?

A) human error
B) damage by employees
C) hackers
D) all of these
سؤال
Three main goals of information security are to achieve confidentiality,integrity,and availability within an HRIS.
سؤال
All companies have been affected by computer-based fraud,such as data processing or data entry routines that are modified.
سؤال
Viruses and trojans are common external security threats to organizations and often come in e-mail attachments.
سؤال
What is meant by information security in HRIS?
سؤال
Briefly list and describe the important goals and considerations of information security.
سؤال
What is the difference between a computer virus and spyware?
سؤال
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least five best practices that were discussed in class,as well as in your textbook.
سؤال
What is meant by phishing?
سؤال
Describe cyberterrorism and how to at least control its impact.
سؤال
Describe the McCumber Cube approach to privacy.
سؤال
There are many threats to information security.Please describe five information security threats.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/28
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: HRIS Privacy and Security
1
______ are best described as people who accesses a computer or computer network unlawfully.

A) Hackers
B) Viruses, worms, and trojans
C) Information thieves
D) Disgruntled employees
A
2
Which of these is NOT a well-known "worm" threat?

A) Slammer
B) Code Red
C) MyDoom
D) MyPirate
D
3
Which of the following is NOT considered a software threat to security?

A) worms
B) spyware
C) trojan virus
D) file corruption
D
4
Human error and natural disasters are not considered viable threats to employee privacy and data security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT considered a threat to security?

A) human error
B) disgruntled employees and ex-employees
C) other "internal" attackers
D) none of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
6
Integrity ensures that information is created and modified in an authorized manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which type of security threat is the most widespread,affecting almost 90% of companies?

A) computer fraud
B) phishing
C) denial of service
D) theft of hardware components, such as storage cards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
8
According to the text,approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?

A) 25%
B) 30%
C) 75%
D) 100%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is NOT a recommended privacy policy statement?

A) Adopt a comprehensive information security and privacy policy.
B) Store sensitive personal data in secure HRIS, and provide appropriate encryption.
C) Dispose of documents properly, or restore persistent storage equipment.
D) Conduct focus groups with selected employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which is NOT a symptom of spyware on an employee's computer?

A) invasion of privacy
B) appropriation of personal information
C) interference with the speed and responsiveness of the computer
D) proliferation of pop-up ads
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
11
A hacker is defined as someone who accesses a computer or computer network unlawfully.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which state has passed a law protecting employee records in private organizations?

A) California
B) Ohio
C) New York
D) Oregon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
13
Phishing is known as the illegal scheme where victims usually receive e-mail messages that appear to come from an authentic source with which the victim does business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
14
The McCumber Cube for Data Privacy has three dimensions.Which of the following is NOT a dimension that is used to organize a privacy policy?

A) desired information goals
B) countermeasures
C) state of information
D) use of information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?

A) Train users on how to securely use and handle the equipment, data, and software.
B) Make backup copies of data files and programs.
C) Do not allow passwords to be shared. Change passwords frequently.
D) Require employees to take sensitive material home with them so that it is not left at the office.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
16
Information security breaches cost approximately ______ annually.

A) $78 million
B) $45 billion
C) $10 billion
D) $100 billion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is considered a common security threat?

A) human error
B) damage by employees
C) hackers
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
18
Three main goals of information security are to achieve confidentiality,integrity,and availability within an HRIS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
19
All companies have been affected by computer-based fraud,such as data processing or data entry routines that are modified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
20
Viruses and trojans are common external security threats to organizations and often come in e-mail attachments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is meant by information security in HRIS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
22
Briefly list and describe the important goals and considerations of information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is the difference between a computer virus and spyware?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
24
What are some of the best practices that HR managers should consider to secure information security and privacy? Be sure to list at least five best practices that were discussed in class,as well as in your textbook.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is meant by phishing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe cyberterrorism and how to at least control its impact.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
27
Describe the McCumber Cube approach to privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
28
There are many threats to information security.Please describe five information security threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 28 في هذه المجموعة.