Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Information Systems Study Set 1
Quiz 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 261
Multiple Choice
What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?
Question 262
Multiple Choice
Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month.Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?
Question 263
Multiple Choice
What is phishing?
Question 264
Multiple Choice
What is pretexting?
Question 265
Multiple Choice
Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reasons on personal networks are two areas that should be addressed by managers in which of the following company policies?
Question 266
Multiple Choice
Which of the following represents the three areas where technology can aid in the defense against information security attacks?
Question 267
Multiple Choice
What is it called when a hacker looks through your trash to find personal information?
Question 268
Multiple Choice
What is dumpster diving?
Question 269
Multiple Choice
What is the difference between phishing and pharming?
Question 270
Multiple Choice
What is a phishing expedition?
Question 271
Multiple Choice
What is a destructive agent?
Question 272
Multiple Choice
Which of the following is an example of a way to maintain information security that a company should include in their information security policies?