Filters
Question type

Study Flashcards

Information ethics concerns mainly:


A) Ethical issues
B) Moral issues
C) Judicious usage of information
D) All of these

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair Use Doctrine

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is not one of the top 10 questions managers should ask regarding information security?


A) Is there clear accountability for information security in our organization?
B) How much is spent on information security and what is it being spent on?
C) What is the impact on the organization of a serious security incident?
D) How do we identify potential insiders?

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Ethical concerns over ______________ monitoring occurs when the monitoring is unprecedented or overly intrusive.

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A(n) ___________ privacy policy contains general principles regarding information privacy.

Correct Answer

verifed

verified

Which of the following is not included in the four quadrants of ethical and legal behaviour?


A) Legal behaviour and ethical behaviour
B) Illegal behaviour and ethical behaviour
C) Legal behaviour and unethical behaviour
D) None of these

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following are covered by Canada's Privacy Act?


A) medical records
B) security clearances
C) tax records
D) All of these

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?


A) Biometrics
B) Encryption
C) Firewalls
D) Content Filtering

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What was the primary problem Saab encountered with one of its marketing companies?


A) Contacted customers based on opt-out decision
B) Contacted customers based on opt-in decision
C) Contacted customers regardless of their opt-out or opt-in decision
D) Failed to contact any customers

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Authentication
B) Prevention
C) Detection
D) Response

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

____________ is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

Correct Answer

verifed

verified

Describe the relationship between an email privacy policy and in Internet use policy.

Correct Answer

verifed

verified

Organizations can mitigate the risks of ...

View Answer

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is the primary difference between the different types of backup/recovery media?


A) Speed
B) Cost
C) Expense
D) All of these

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The purpose of ______________ is to provide Canadians with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization.

Correct Answer

verifed

verified

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

What does the disaster recovery cost curve chart?


A) The cost to the organization of the unavailability of information
B) The cost to the organization of recovering from a disaster over time
C) The cost to the organization of the unavailability of technology
D) All of these

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 101 - 120 of 200

Related Exams

Show Answer