Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Study Set 4
Quiz 4: Ethics and Information Security: Mis Business Concerns
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Question 22
True/False
Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
Question 23
True/False
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
Question 24
True/False
A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.
Question 25
True/False
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Question 26
True/False
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
Question 27
True/False
Cyberbullying is an act or object that poses a danger to assets.
Question 28
True/False
Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
Question 29
True/False
Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Question 30
True/False
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
Question 31
True/False
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
Question 32
True/False
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
Question 33
True/False
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
Question 34
True/False
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Question 35
True/False
Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.
Question 36
True/False
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
Question 37
True/False
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
Question 38
True/False
Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.
Question 39
True/False
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.