Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Managers
Quiz 12: Ethical, privacy, and Security Issues
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Discussing security attacks through public trials and the associated publicity not only has enormous potential costs in public relations,but no real monetary costs.
Question 22
Multiple Choice
A(n) ____ defines an organization's security requirements as well as the controls and sanctions needed to meet those requirements.
Question 23
Multiple Choice
The ____ Amendment of the Constitution protects citizens from unreasonable searches by the government and is often used to protect the privacy of government employees.
Question 24
Multiple Choice
The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
Question 25
Multiple Choice
Ethical behavior conforms to ____.
Question 26
Multiple Choice
The ____ is a senior-level manager who provides vision and direction in the area of business conduct.
Question 27
Multiple Choice
A ____ stands guard between your organization's internal network and the Internet,and limits network access based on the organization's access policy.
Question 28
Multiple Choice
In a for-profit corporation,the ____ primary objective is to oversee the organization's business activities and management for the benefit of all stakeholders,including shareholders,customers,employees,suppliers,and the community.
Question 29
Multiple Choice
The code of ____ defines five widely accepted core principles concerning fair information practices of privacy protection.
Question 30
True/False
An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again.
Question 31
Multiple Choice
Antivirus software scans for a specific sequence of bytes,known as a(n) ____.
Question 32
True/False
Expert crackers can conceal their identity and tracking them down can take a long time as well as a tremendous amount of corporate resources.
Question 33
Multiple Choice
It is crucial that antivirus software be updated continually with the latest virus detection information,called ____.
Question 34
Multiple Choice
A ____ is an organization's review of potential threats to its computers and networks along with an analysis of the probability that these will occur and prevent the organization from meeting key business objectives.