Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Management » Page 152

Management

Q: _____ is software thatruns in the background to protect a user's computer from dangers lurking on theInternet and other possible sources ofinfected files.

Q: Practitioners in many professions subscribe to a(n) _____ that states the principles and core values that are essential to their work, and, therefore, govern their behavior.

Q: Software programs thatwhen loaded into a computer systemwill destroy, interrupt, or cause errors inprocessing are known as _____.

Q: The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called _____.

Q: The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.

Q: A party offended by a libel can file what is known as a(n) _____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP)to provide whatever information it has about the anonymous poster, including Internet Protocol (IP) address, name, and street address.

Q: The _____, passed byCongress in October 1998,was directed at Web sites catering to children, requiring site owners to post comprehensive privacy policies and toobtain parental consent before they collect any personal information fromchildren under 13 years of age.

Q: A(n) _____ is a person paid by a company to lie about how much he or she has earned and how easy the plan was to operate.

Q: Many organizations use _____ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defenses,including threats, exposures, policy compliance,and incident alerts.

Q: A(n) _____ monitors system and network resourcesand traffic and notifies network security personnel when it senses a possibleintrusion.

Q: _____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.

Q: _____ is the processof converting an original electronic message into a form that can be understoodonly by the intended recipients.

Q: _____ are employees,disgruntled or otherwise, working solo or in concert with outsiders to compromisecorporate systems.

Q: _____ is a form of computer scamthat attempts to get users to gainaccess to a customer's private informationthrough a fake Web site.

Q: _____ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.

Q: _____ is a scam that attempts to stealan individual's private information byhaving them call a phone number andenter personal data.

Q: The act of going through thetrash of an organization to find secret orconfidential information, includinginformation needed to access an informationsystem or its data is known as _____.

Q: Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.

Q: _____ is a Web-based data sharing system that places millions of nationwide booking records at the fingertips of law enforcement officials.

Q: _____ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.

Q: _____ is the intimidation of government or civilian population byusing information technology to disable critical national infrastructures (e.g.,energy, transportation, financial, law enforcement, emergency response) toachieve political, religious, or ideological goals.

Q: _____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.

Q: _____ is an activity in which a criminal illegally gains access to another's line of credit with stolen credit card numbers.

Q: Organizations operating unintegrated information systems, acquiring redundant systems, and wasting information system are examples of _____.

Q: Founded in1947, the _____ is the oldest computing society and boasts more than 100,000 members in more than 100 countries. a. United States Computer Emergency Readiness Team (US-CERT) b. Computer Sciences Corporation (CSC) c. Domain-based Message Authentication, Reporting, and Conformance group (DMARC) d. Association for Computing Machinery (ACM)

Q: Heavy computer users who experiencered, dry, itchy eyesshould _____. a. consider the use of artificial tears b. consider the use of older, but more human friendly CRT monitors c. keep their focus on their screens for long hours d. avoid blinking often

Q: _____ is an inflammation of the nerve that connects the forearm to the palm of the wrist. a. Carpal tunnel syndrome (CTS) b. Seated immobility thromboembolism (SIT) c. Chronic idiopathic mylofibrosis d. Behcet's syndrome

Q: The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. a. Gramm-Leach-Bliley Act b. Fair Credit Reporting Act c. USA Patriot Act d. Fair and Accurate Credit Transactions Act

Q: Which of the following statements is true of the E-Government Act of 2002? a. Itrenews the U.S. government's authority to monitor electronic communicationsof foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). b. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. c. It restricts government access to certain records held by financial institutions. d. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power.

Q: The _____ requires telephone companies to turn over customer information, including numbers called, without a court order, if the Federal Bureau of Investigation (FBI)claims that the records are relevant to a terrorism investigation. a. Cable Act of 1992 b. Electronic Communications Privacy Act of 1986 c. Gramm-Leach-Bliley Act of 1999 d. USA Patriot Act of 2001

Q: Which of the following statements is true of federal laws? a. They permit employers to monitor instant messages sent and received by employees. b. They authorize public officials to meet in private about matters that affect thestate or local area. c. Theycompletely protect individual privacy. d. They forbid customers and employees from accessing data about themselves.

Q: Proper use of antivirus software requires:a. scanning all removable media before copying programs from them.b. running the software only if a virus has been detected.c. refraining from updating the software often.d. installing software from unsealed packages.

Q: A useful guideline to protect corporate computers from criminal hackers is to: a. install antivirus software on all computers. b. enable physical access to servers. c. provide overfriendly sign-in procedures for remote users. d. enable several guest accounts.

Q: Under the Identity Theft and Assumption Deterrence Actof 1998, the _____is assigned responsibility to help victims restore their credit and erasethe impact of the imposter. a. Federal Bureau of Investigation (FBI) b. Federal Trade Commission (FTC) c. Securities and Exchange Commission (SEC) d. Department of Justice (DOJ)

Q: The practice of disguising illegally gained funds so that they seem legal is called _____. a. identity theft b. vishing c. spoofing d. money laundering

Q: _____ is a scam that attempts to steal an individual's private information by having them respond to a text message. a. Phishing b. Smishing c. Vishing d. Sniffing

Q: If convictedfor copyright infringement,software pirates could besentenced to jail for up to _____ years. a. two b. ten c. five d. three

Q: _____ refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software. a. Copyright protection b. Software protection dongle c. Software piracy d. Digital rights management

Q: A _____ is a small program hidden in a network or computer system that records identification numbers. a. logic bomb b. password sniffer c. Trojan horse d. rootkit

Q: A _____ is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code. a. rootkit b. variant c. Trojan horse d. worm

Q: A _____ is a set of programs that enables its user to gain administrator level access to a computer or network. a. virus b. Trojan horse c. rootkit d. worm

Q: A _____ is a type of Trojan horse that executes when specific conditions occur. a. virus b. worm c. logic bomb d. rootkit

Q: _____ have extra knowledge that make them especially dangerousthey know logon IDs, passwords, and company procedures that help them evade detection. a. Crackers b. Hackers c. Insiders d. Script bunnies

Q: A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money. a. hacker b. insider c. cracker d. script bunny

Q: The ______ Web-based service system is one of several information systems used by law enforcement to recover stolen property. a. LeadsOnline b. JusticeXchange c. Watch Systems d. CRIMECAST

Q: _____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user. a. Dumpster diving b. Cyberterrorism c. Social engineering attack d. Organizational identity theft

Q: The Internet Crime Computer Center (IC3)is an alliance between ______. a. theDepartment of Homeland Security andthe White Collar Crime Center b. theDepartment of Homeland Security and theDepartment of Justice c. the White Collar Crime Center and theFederal Bureau of Investigation d. theFederal Bureau of Investigation and theCentral Intelligence Agency

Q: The final step to prevent computer-related waste is to: a. ensure that users throughout an organization are following established procedures. b. establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices. c. review existing policies and procedures and determine whether they are adequate. d. check whether current policies cover existing practices adequately.

Q: _____ refer to errors, failures, and other computer problems that make computer output incorrect or not useful. a. Computer-related wastes b. Human errors c. Computer-related mistakes d. Coding errors

Q: IS professionals believe that their field offers few opportunities for unethical behavior. a. True b. False

Q: If an activity is defined as legal then it is ethical. a. True b. False

Q: The monitor should be about one arm's length away from a user. a. True b. False

Q: Carpal tunnel syndrome (CTS) isthe formation of blood clots in the legs or lungs. a. True b. False

Q: A job that requires sitting at a desk and using a computer for many hours a day doubles the risk of seated immobility thromboembolism (SIT). a. True b. False

Q: Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes. a. True b. False

Q: Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the libeler. a. True b. False

Q: The use of email among public officials might violate "open meeting" laws. a. True b. False

Q: Federal law prohibits employers from monitoring email sent or received by their employees. a. True b. False

Q: To safeguard a user's PC and prevent it fromspreading malware to the user's friends and coworkers, some antivirus softwarescans and cleans both incoming and outgoing email messages. a. True b. False

Q: For those computers with an integrated Web cam, tracking software sends messages via a wireless network to the specified email address, pinpointing its location and including a picture of the thief. a. True b. False

Q: Not many small and medium sized organizations are willing to outsource their network security operations. a. True b. False

Q: The combination of duties is a key concept of good internal controls. a. True b. False

Q: Role-based system access means that only people who fill a certain role can access a specific system. a. True b. False

Q: Incidents of identity theft are reported to the Department of Justice. a. True b. False

Q: Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance (DMARC)group to provide improved e-mail security and protection from phishing. a. True b. False

Q: To obtain a patent or to determine if a patent exists in an area a company seeks to exploit, a search by the U.S. Patent Office is required; these can last longer than 25 months. a. True b. False

Q: Patent laws protect processes, machines, and compositions of matter. a. True b. False

Q: Smartphonesespecially ones running the popular Android operating systemcan run applications that are impervious to malware. a. True b. False

Q: A rootkit is a type of Trojan horse that executes when specific conditions occur. a. True b. False

Q: A script bunny is a young, female computer hacker. a. True b. False

Q: A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them. a. True b. False

Q: The public cannot gain online access to information about registered sex offenders online because of various privacy laws. a. True b. False

Q: The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment, warning, investigation, and response to cyberterrorism threats or attacks against the country's critical infrastructure. a. True b. False

Q: The ready availability of personal computers, coupled with the developmentof mapping and analysis software, has led law enforcement agencies to usecrime-related data, powerful analysis techniques, and geographic informationsystems (GIS) to better understand and even diminish crime risks. a. True b. False

Q: Many computer crimes go unreported because companies do not want bad publicity or don"t think that law enforcement can help. a. True b. False

Q: Relaxing controls for changes to critical tables, HTML, and URLs is a useful policy to minimize computer-relatedwaste and mistakes. a. True b. False

Q: The first step to prevent computer-related waste is to review existing policies and procedures and determine whether they are adequate. a. True b. False

Q: As information technology becomes faster, more complex, and more powerful, the risk of computer-related mistakes decreases tremendously. a. True b. False

Q: Most computer-related mistakes are caused by machine error. a. True b. False

Q: Identify the major reasons for the failure of information systems projects.

1 2 3 … 1,015 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved