1/149
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following represents the two fundamental building blocks that protect organizational information?
ethics and security
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
confidentiality
Which of the following represents the principles and standards that guide our behavior toward other people?
ethics
What is the difference between pirated and counterfeit software?
Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit is software that is manufactured to look like the real thing and sold as such.
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
privacy
Which of the following represents the definition of information property?
an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
Which of the following represents the definition of information management?
examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Which of the following represents the definition of information compliance?
the act of conforming, acquiescing, or yielding information
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
intellectual property
Which of the following describes confidentiality?
the assurance that messages and information are available only to those who are authorized to view them
Which rule is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence?
Rule 41
What is ediscovery?
the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
What is the Child Online Protection Act?
a law passed to protect minors from accessing inappropriate material on the Internet
Which policy contains general principles regarding information privacy?
information privacy policy
Which of the following policies details the extent to which email messages may be read by others?
email privacy policy
What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?
antispam policy
What is the electronic defacing of an existing website?
cybervandalism
Which of the following is one of the four basic options included in a bring your own device policy?
unlimited access for personal devices, access only to nonsensitive systems and data, access but preventing local storage of data on personal devices
What refers to choosing to allow permissions to incoming emails?
opt in
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
social media monitoring
Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?
social media manager
What outlines the corporate guidelines or principles governing employee online communications?
social media policy
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
click-fraud
Which of the following definitions represents Internet censorship?
government attempts to control Internet traffic, thus preventing some material from being viewed by a country’s citizens
Which of the following is not an example of unplanned downtime?
system upgrade
What is software written with malicious intent to cause annoyance or damage?
virus
What builds the national capacity to defend against cyberattacks and works with the federal government to provide cyber security tools, incident response services, and assessment capabilities to safeguard .gov networks?
Cybersecurity and Infrastructure Security Agency
What is simplelocker?
a form of malicious software that infects your computer and asks for money
Who are hackers with criminal intent?
crackers
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
cyberterrorists
Which of the following types of viruses spread themselves not just from file to file but also from computer to computer?
worm
What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?
adware
What is a hacker?
experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
What is information security?
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
What are the first two lines of defense a company should take when addressing security risks?
people first, technology second
Which of the following represents the biggest problem of information security breaches?
people misusing organizational information
What is a form of social engineering in which one individual lies to obtain confidential data about another individual?
pretexting
What is dumpster diving?
a hacker looking through your trash to find personal informatio
What is a method for confirming users’ identities?
authentication
What type of encryption technology uses multiple keys, one for public and one for private?
public key encryption
What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?
firewall
Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?
antivirus software
What is a device that is around the same size as a credit card and contains embedded technologies that can store information and small amounts of software to perform some limited processing?
smart card
What is multifactor authentication?
requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)
What gathers an organization’s computer network traffic patterns to identify unusual or suspicious operations?
network behavior analysis
What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals?
cyberterrorism
What is the traditional security process that requires a username and password?
single-factor authentication
What are biometrics?
the identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting
Where do organizations typically place firewalls?
between the server and the Internet
What reroutes requests for legitimate websites to false websites?
pharming
What is information secrecy?
the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
What reroutes requests for legitimate websites to false websites?
pharming
What are computer viruses that wait for a specific date before executing their instructions?
time bombs
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
digital certificate
What scrambles information into an alternative form that requires a key or password to decrypt?
encryption
What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?
cryptography
What is an information MIS infrastructure?
identifies where and how important information, such as customer records, is maintained and secured
Which of the following is a benefit of a solid MIS infrastructure?
reduces costs, improves productivity, optimizes business operations
What is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate?
network
What is a computer designed to request information from a server?
client
What is hardware?
consists of the physical devices associated with a computer system
What is software?
the set of instructions the hardware executes to carry out specific tasks
What is a client?
a computer designed to request information from a server
Accessibility, availability, maintainability, portability, reliability, scalability, and usability are all elements of a(n) ________Blank MIS infrastructure.
agile
Which of the following describes the difference between a backup plan and a recovery plan?
Backup is an exact copy of a system’s information, whereas recovery is the ability to get a system up and running in the event of a system crash or failur
What occurs when a primary machine recovers and resumes operations, taking over from a secondary server?
failback
Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane?
disrupted communications
damaged physical infrastructures
halted transportation
Among the sites that support disaster recovery, a ________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
cold site
Among the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
hot site
Among the sites that support disaster recovery, a ________ is a separate facility with computer equipment that requires installation and configuration.
warm site
What is a disaster recovery plan?
a detailed process for recovering information or a system in the event of a catastrophic disaster
Which of the following is an example of an emergency notification system?
radio stations’ occasional tests of the national alert system
What is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property?
emergency
What identifies all critical business functions and the effect that a specific disaster may have upon them?
business impact analysis
What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements?
technology recovery strategy
Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?
portability
What does reliability ensure?
the system is functioning correctly and providing accurate information
What measures how quickly a system performs a process or transaction?
performance
What is usability?
the system is easy to learn, efficient, and satisfying to use
What refers to how well a system can adapt to increased demands?
scalability
What is a system weakness that can be exploited by a threat?
vulnerability
What is availability?
time frames when the system is operational
What is reliability?
ability to ensure that a system is functioning correctly and providing accurate information
What is the difference between unavailable and high availability?
Unavailable is when the system is not operating and can’t be used, whereas high availability is when a system is continuously operating at all times.
What is performance?
how quickly a system performs a process or transaction
What is usability?
the degree to which a system is easy to learn, efficient, and satisfying to use
What is scalability?
how well a system can scale up or adapt to the increased demands of growth
Which of the following reflects Moore’s law?
the computer chip performance per dollar doubles every 18 months
What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment?
sustainability or green MIS
Sustainable MIS is a critical part of ________ Blank within a company.
corporate social responsibility
What is a green personal computer?
a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment
What is upcycle?
reusing or refurbishing ewaste and creating a new product
What is a company’s acknowledged responsibility to society?
corporate social responsibility
Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem?
grid computing
What is dynamic scaling?
MIS infrastructure that can be automatically scaled up or down based on needed requirements
What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple ‘virtual’ machines all on a single computing device?
virtualization
What is a facility used to house management information systems and associated components, such as telecommunications and storage systems?
data center
What does a single instance of a system serving multiple customers mean in the cloud?
multi-tenancy
What occurs when each customer or tenant must purchase and maintain an individual system?
single-tenancy
What promotes massive, global, industry-wide applications offered to the general public?
public cloud