Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Information Systems Study Set 1
Quiz 4: Ethics and Information Security: Mis Business Concerns: Module 2: Technical Foundations of MIS
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Question 22
True/False
Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Question 23
True/False
Cybervandalism is the electronic defacing of an existing website.
Question 24
True/False
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Question 25
True/False
Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
Question 26
True/False
Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
Question 27
True/False
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Question 28
True/False
An ethical computer use policy contains general principles to guide computer user behavior.
Question 29
True/False
Teergrubing is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Question 30
True/False
Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
Question 31
True/False
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Question 32
True/False
BYOD policies offer four basic options, including 1) unlimited access for personal devices, 2) access only to nonsensitive systems and data, 3) access, but with IT control over personal devices, apps, and stored data, and 4) access, but preventing local storage of data on personal devices.
Question 33
True/False
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
Question 34
True/False
Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Question 35
True/False
An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the Internet.