Deck 9: Enterprise Information Systems: ERP and SCM

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is considered a type of biometrics?

A) Voice
B) Face
C) Iris
D) All of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is not one of the top 10 questions managers should ask regarding information security?

A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?
سؤال
What is the most costly and intrusive form of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above
سؤال
What is social engineering?

A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
سؤال
What is the most secure type of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above
سؤال
Which of the following can be completed by encryption?

A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of the above
سؤال
Which of the following authentication methods is 100 percent accurate?

A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above
سؤال
What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

A) Token
B) Password
C) Smart card
D) Biometrics
سؤال
What identifies the rules required to maintain information security?

A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
سؤال
What is spam?

A) A type of encryption
B) A type of content filtering
C) A form of unsolicited e-mail
D) None of the above
سؤال
What is a method for confirming users' identities?

A) Authentication
B) Prevention
C) Detection
D) Response
سؤال
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

A) Hactivist
B) Social engineering
C) Insiders
D) Virus
سؤال
What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

A) Smart card
B) Token
C) Biometrics
D) Content filtering
سؤال
What is encryption?

A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited e-mail
سؤال
What are the technologies available to help prevent and build resistance to attacks?

A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
سؤال
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

A) Biometrics
B) Encryption
C) Firewalls
D) Content Filtering
سؤال
Which of the following is not one of the five steps for creating an information security plan?

A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks
سؤال
What is the recommended way to implement information security lines of defence?

A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above
سؤال
Which of the following is not one of the three primary information security areas?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above
سؤال
Where do organizations typically place firewalls?

A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
سؤال
Which of the following does a firewall perform?

A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of the above
سؤال
Who are hackers with criminal intent?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
سؤال
What is intangible creative work that is embodied in physical form?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
سؤال
Who breaks into other people's computer systems and just looks around or steals and destroys information?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
سؤال
What is the most common type of defence within detection and response technologies?

A) Malicious code
B) Token
C) User ID
D) Antivirus software
سؤال
What includes a variety of threats such as viruses,worms,and Trojan horses?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
Which of the following is a program or device that can monitor data traveling over a network?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
سؤال
What is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
سؤال
What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
سؤال
If there is a security breech on your organizational information systems,which information security area is best suited to handle the breech?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
سؤال
What is the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
What is it called when you may use copyrighted material in certain situations-for example,in the creation of new work or,within certain limits,for teaching purposes?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair dealing
سؤال
What attacks computer systems by transmitting a virus hoax,with a real virus attached?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
سؤال
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
سؤال
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
سؤال
What are the principles and standards that guide our behaviour toward other people?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
سؤال
Who works at the request of the system owners to find system vulnerabilities and plug the holes?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
سؤال
Which is a virus that opens a way into the network for future attacks?

A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs
سؤال
What floods a Web site with so many requests for service that it slows down or crashes the site?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
سؤال
What is a small file deposited on a hard drive by a Web site containing information about customers and their Web activities?

A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
سؤال
What is software that is manufactured to look like the real thing and sold as such?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
سؤال
Which of the following is not considered an ePolicy?

A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) None of the above
سؤال
Which of the following is not included in the four quadrants of ethical and legal behaviour?

A) Legal behaviour and ethical behaviour
B) Illegal behaviour and ethical behaviour
C) Legal behaviour and unethical behaviour
D) None of the above
سؤال
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

A) Ethics
B) ePolicies
C) All of the above
D) None of the above
سؤال
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
سؤال
According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.

A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above
سؤال
Which of the following is not one of the six principles for ethical information management according to CIO magazine?

A) Information is a valuable corporate asset and should be managed as such
B) The CIO is responsible for controlling access to and use of information
C) The CIO is responsible for preventing the inappropriate destruction of information
D) The CIO is responsible for how outsiders view and analyze corporate information
سؤال
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
سؤال
Which of the following describes ePolicies?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
سؤال
What is the unauthorized use,duplication,distribution,or sale of copyrighted software?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
سؤال
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behaviour toward other people
سؤال
What was the primary problem Saab encountered with one of its marketing companies?

A) Contacted customers based on opt-out decision
B) Contacted customers based on opt-in decision
C) Contacted customers regardless of their opt-out or opt-in decision
D) Failed to contact any customers
سؤال
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above
سؤال
Which of the following is/are covered by Canada's Privacy Act:

A) medical records
B) security clearances
C) tax records
D) All of the above
سؤال
What is the policy that contains general principles to guide computer user behaviour?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of the above
سؤال
What is the ideal type of decisions for people in an organization to make?

A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
سؤال
Which of the following is not one of the 10 Guiding principals of PIPEDA for organizations:

A) Accountability
B) Accuracy
C) Open access
D) Safeguards
سؤال
Canada's privacy laws follow very closely to the:

A) European model
B) US model
C) Bork model
D) None of the above
سؤال
Which of the following is an effect of employee monitoring?

A) Employee absenteeism is on the rise.
B) Job satisfaction is on the rise.
C) Psychological reactance is prevented.
D) All of the above.
سؤال
If an organization were to have only one policy,which one would it want?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
سؤال
Surprisingly,the biggest issue surrounding information security is not a people issue,but a technical issue.
سؤال
What is one of the guidelines an organization can follow when creating an information privacy policy?

A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above
سؤال
What is identity theft?

A) Is the forging of someone's identity for the purpose of fraud
B) Is monitoring emails
C) Is hacking in a computer system with the purpose of stealing information
D) Is buying illegal information from a hacker
سؤال
What is a program,when installed on a computer,records every keystroke and mouse click?

A) Key logger software
B) Spyware
C) Cookie
D) Adware
سؤال
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
It is common practice to sign an AUP before being granted a network ID.
سؤال
Which policy typically contains a nonrepudiation clause?

A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
سؤال
Which of the following is not a part of the e-mail privacy policy stipulations?

A) It defines who legitimate e-mail users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's e-mail
D) It informs people that the organization has full control over e-mail once it is transmitted outside the organization
سؤال
Which of the following is part of the acceptable use policy stipulations?

A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of the above
سؤال
Which of the following represents the estimated percentage that spam accounts for in an organizations' e-mail traffic?

A) 20 to 30 percent
B) 30 to 50 percent
C) 40 to 60 percent
D) None of the above
سؤال
What is a contractual stipulation that ensures that e-business participants do not deny their online actions?

A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
سؤال
Which of the following describes information technology monitoring?

A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
سؤال
What is one of the major problems with e-mail?

A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of the above
سؤال
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Which policy details the extent to which e-mail messages may be read by others?

A) Acceptable use policy
B) E-mail privacy policy
C) Internet use policy
D) None of the above
سؤال
Which of the following is part of the acceptable use policy stipulations?

A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
سؤال
Which policy contains general principles regarding information privacy?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy
سؤال
Which of the following represents the classic example of unintentional information reuse?

A) Phone number
B) Social Security number
C) Address
D) Driver's license number
سؤال
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of the above
سؤال
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/171
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Enterprise Information Systems: ERP and SCM
1
Which of the following is considered a type of biometrics?

A) Voice
B) Face
C) Iris
D) All of the above
D
Explanation: All of the above are considered biometrics.
2
Which of the following is not one of the top 10 questions managers should ask regarding information security?

A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?
D
Explanation: How do we identify potential insiders is not one of the top ten questions managers should ask.
3
What is the most costly and intrusive form of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) None of the above
C
Explanation: Biometric authentication can be costly and intrusive.
4
What is social engineering?

A) Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
B) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
C) Small electronic devices that change user passwords automatically
D) A method for confirming user's identities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the most secure type of authentication?

A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following can be completed by encryption?

A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following authentication methods is 100 percent accurate?

A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

A) Token
B) Password
C) Smart card
D) Biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
9
What identifies the rules required to maintain information security?

A) Information security plan
B) Information security policies
C) Authentication
D) Biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
10
What is spam?

A) A type of encryption
B) A type of content filtering
C) A form of unsolicited e-mail
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is a method for confirming users' identities?

A) Authentication
B) Prevention
C) Detection
D) Response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

A) Hactivist
B) Social engineering
C) Insiders
D) Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

A) Smart card
B) Token
C) Biometrics
D) Content filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
14
What is encryption?

A) Occurs when an organization uses software that filters content to prevent the transmission of unauthorized information
B) Scrambles information into an alternative form that requires a key or password to decrypt the information
C) Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
D) A form of unsolicited e-mail
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
15
What are the technologies available to help prevent and build resistance to attacks?

A) Content filtering, encryption, firewalls
B) Content filtering, encryption, insiders
C) Encryption, firewalls, insiders
D) Firewalls, social engineering, encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
16
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

A) Biometrics
B) Encryption
C) Firewalls
D) Content Filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is not one of the five steps for creating an information security plan?

A) Develop the information security policies
B) Communicate the information security policies
C) Revise and test the information security policies
D) Test and reevaluate risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is the recommended way to implement information security lines of defence?

A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is not one of the three primary information security areas?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and resistance
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
20
Where do organizations typically place firewalls?

A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following does a firewall perform?

A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
22
Who are hackers with criminal intent?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is intangible creative work that is embodied in physical form?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
24
Who breaks into other people's computer systems and just looks around or steals and destroys information?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is the most common type of defence within detection and response technologies?

A) Malicious code
B) Token
C) User ID
D) Antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
26
What includes a variety of threats such as viruses,worms,and Trojan horses?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following is a program or device that can monitor data traveling over a network?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
28
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
29
What is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
31
If there is a security breech on your organizational information systems,which information security area is best suited to handle the breech?

A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
33
What is it called when you may use copyrighted material in certain situations-for example,in the creation of new work or,within certain limits,for teaching purposes?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair dealing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
34
What attacks computer systems by transmitting a virus hoax,with a real virus attached?

A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
36
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?

A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are the principles and standards that guide our behaviour toward other people?

A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
38
Who works at the request of the system owners to find system vulnerabilities and plug the holes?

A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which is a virus that opens a way into the network for future attacks?

A) Distributed denial-of-service attack
B) Worm
C) Denial-of-service attack
D) Backdoor programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
40
What floods a Web site with so many requests for service that it slows down or crashes the site?

A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is a small file deposited on a hard drive by a Web site containing information about customers and their Web activities?

A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is software that is manufactured to look like the real thing and sold as such?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
43
Which of the following is not considered an ePolicy?

A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following is not included in the four quadrants of ethical and legal behaviour?

A) Legal behaviour and ethical behaviour
B) Illegal behaviour and ethical behaviour
C) Legal behaviour and unethical behaviour
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
45
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

A) Ethics
B) ePolicies
C) All of the above
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
47
According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.

A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following is not one of the six principles for ethical information management according to CIO magazine?

A) Information is a valuable corporate asset and should be managed as such
B) The CIO is responsible for controlling access to and use of information
C) The CIO is responsible for preventing the inappropriate destruction of information
D) The CIO is responsible for how outsiders view and analyze corporate information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following describes confidentiality?

A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following describes ePolicies?

A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
51
What is the unauthorized use,duplication,distribution,or sale of copyrighted software?

A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of the following describes privacy?

A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behaviour toward other people
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
53
What was the primary problem Saab encountered with one of its marketing companies?

A) Contacted customers based on opt-out decision
B) Contacted customers based on opt-in decision
C) Contacted customers regardless of their opt-out or opt-in decision
D) Failed to contact any customers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following is an example of acting ethically?

A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which of the following is/are covered by Canada's Privacy Act:

A) medical records
B) security clearances
C) tax records
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
56
What is the policy that contains general principles to guide computer user behaviour?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is the ideal type of decisions for people in an organization to make?

A) Legal and ethical
B) Illegal and ethical
C) Legal and unethical
D) Illegal and unethical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following is not one of the 10 Guiding principals of PIPEDA for organizations:

A) Accountability
B) Accuracy
C) Open access
D) Safeguards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
59
Canada's privacy laws follow very closely to the:

A) European model
B) US model
C) Bork model
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is an effect of employee monitoring?

A) Employee absenteeism is on the rise.
B) Job satisfaction is on the rise.
C) Psychological reactance is prevented.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
61
If an organization were to have only one policy,which one would it want?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
62
Surprisingly,the biggest issue surrounding information security is not a people issue,but a technical issue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
63
What is one of the guidelines an organization can follow when creating an information privacy policy?

A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
64
What is identity theft?

A) Is the forging of someone's identity for the purpose of fraud
B) Is monitoring emails
C) Is hacking in a computer system with the purpose of stealing information
D) Is buying illegal information from a hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
65
What is a program,when installed on a computer,records every keystroke and mouse click?

A) Key logger software
B) Spyware
C) Cookie
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy
It is common practice to sign an AUP before being granted a network ID.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which policy typically contains a nonrepudiation clause?

A) Ethical computer use policy
B) Anti-spam policy
C) Information privacy policy
D) Acceptable use policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
68
Which of the following is not a part of the e-mail privacy policy stipulations?

A) It defines who legitimate e-mail users are
B) It explains the backup procedures
C) It describes the legitimate grounds for reading someone's e-mail
D) It informs people that the organization has full control over e-mail once it is transmitted outside the organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
69
Which of the following is part of the acceptable use policy stipulations?

A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which of the following represents the estimated percentage that spam accounts for in an organizations' e-mail traffic?

A) 20 to 30 percent
B) 30 to 50 percent
C) 40 to 60 percent
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
71
What is a contractual stipulation that ensures that e-business participants do not deny their online actions?

A) Copyright
B) Fair use doctrine
C) Nonrepudiation
D) Intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following describes information technology monitoring?

A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
73
What is one of the major problems with e-mail?

A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
74
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which policy details the extent to which e-mail messages may be read by others?

A) Acceptable use policy
B) E-mail privacy policy
C) Internet use policy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
76
Which of the following is part of the acceptable use policy stipulations?

A) Using the service to violate a law
B) Posting commercial messages to groups without prior permission
C) Performing nonrepudiation
D) Not attempting to mail bomb a site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which policy contains general principles regarding information privacy?

A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following represents the classic example of unintentional information reuse?

A) Phone number
B) Social Security number
C) Address
D) Driver's license number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
79
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

A) Ethical computer use policy
B) Acceptable use policy
C) Nonrepudiation policy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
80
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 171 في هذه المجموعة.