Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Business Driven Information Systems
Quiz 4: Ethics and Information Security: MIS Business Concerns
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
Question 102
Multiple Choice
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
Question 103
Multiple Choice
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and ________.
Question 104
True/False
Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
Question 105
Multiple Choice
Which of the following represents the two fundamental building blocks that protect organizational information?
Question 106
Multiple Choice
Trust between companies, customers, partners, and suppliers are the support structure of which of the following?
Question 107
Multiple Choice
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?
Question 108
True/False
Two-factor authentication requires the user to provide two means of authentication, what the user knows (password)and what the user has (security token).
Question 109
Multiple Choice
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
Question 110
True/False
A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Question 111
True/False
A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration of a speaker's mouth and throat, can be expressed as a mathematical formula. Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.
Question 112
True/False
The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.
Question 113
True/False
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Question 114
True/False
Single-factor authentication requires the user to provide two means of authentication, what the user knows (password)and what the user has (security token).
Question 115
True/False
Multi-factor authentication is the traditional security process, which requires a user name and password.
Question 116
Multiple Choice
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
Question 117
Multiple Choice
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
Question 118
True/False
Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).