Three reasons why organizations should develop written epolicies: - Ans -Establish
employee guidelines
-Estab employee procedures
- Estab organizational rules
Info ___ is a broad term encompassing the protection of info from accidental or
intentional misuse by persons inside or outside an orga...
BCIS 1405 Exam | Questions with 100%
Solutions| Verified| Latest Update
Three reasons why organizations should develop written epolicies: - Ans -Establish
employee guidelines
-Estab employee procedures
- Estab organizational rules
Info ___ is a broad term encompassing the protection of info from accidental or
intentional misuse by persons inside or outside an organization. - Ans Security
What scrambles info into an alternative form that requires a key or password to decrypt? - Ans
Encryption
Which policy stating explicit how , when and where the company monitors its employees?
- Employee monitoring policy
- Email monitoring policy
- Info monitoring policy. - Ans - Employee monitoring policy
____ is the assurance that messages and info remain available only to those authorized to view
them. - Ans Confidentiality
Three Epolicies: - Ans - Ethical computer use policy
- Acceptable use policy
- Social Media policy
____ is an anti spamming approach where the receiving computer launches a return attack
against the spammer, sending email messages back to the computer that originated
the suspected spam. - Ans Teergrubing
,What software has purporting to serve some useful function and often fulfilling the function,
also allows internet advertisers to display advertisements without the consent of the computer
user?
-Ransomware
- Hoax
- Adware
-Spyware - Ans - Adware
An info ___ policy contains general principles regarding into privacy. - Ans Privacy
which policy allows employees to use their personal mobile devices and computers to access
enterprise data and a - Ans Bring your own device policy
___ is the right to be left alone when you want to be, to have control over your
personal possessions, and not to be observed without your consent. - Ans Privacy
Technique to gain personal info for purposes to identify theft, usually by means of
fraudulent emails that look as though they came from legitimate business. - Ans Phising
Three categories of authentication and authorization. - Ans - something the user has
- something that is part of the user
- something the user knows
What is hardware and/or software that guard a private network by analyzing an incoming
and outgoing information for the correct markings? - Ans Firewall
____-factor authentication requires the user to provide two means of authentication, what the
user knows (password) and what the user has (security token) - Ans Two
,____ is unsolicited email. - Ans Spam
What is a user doing when they choose to allow permissions to incoming emails. - Ans Opt-in
_____ is a form of social engineering in which one individual lies to obtain confidential data
about another individual. - Ans Pretexing
What is the theft of a website's name that occurs when someone, posing a site's administrator,
changes the ownership of the domain name assigned to the website to another website owner?
- Ans Website name stealing
What is the use of computer and networking tech against persons or property to intimidate or
coerce governments, individuals or any segment of society to attain political religious or
ideological goals? - Ans Cyberterrorism
____ is a special class of adware that collects data about the user and transmits over the
internet without the user's knowledge or permission. - Ans Spyware
What is a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering the
office or organization that owns the network? - Ans Drive-by-hacking
Two items typically contained in an employee monitoring policy. - Ans - Always enforce the
policy the same for everyone
- State the consequences of violating the policy.
What is the traditional security process, which requires a user name and password? - Ans
Single-factor authentication
____ are experts in tech who use their knowledge to break into computers and computer
networks, either for profit or just motivated by the challenge. - Ans Hackers
, What is the science that studies encryption, which is the hiding of messages so that only
the sender and recover can read them. - Ans Cryptography
_____ key encryption uses two keys: a public key that everyone can have and a private key for
only the recipient. - Ans Public
Software that is manufactured to look like the real thing and sold as such?
- Counterfeit software
- Info compliance
- Pirated Software
-Intellectual property - Ans - Counterfeit software
What details how an organization will implement the info security policies?
- info defense policy
- dumpster diving policy
- social engineering plan
- info security plan - Ans - info security plan
Whats the problem when someone registers purposely misspelled variations of well-known
domain names? - Ans Typosquatting
A mail ____ sends a massive amount of email to a specific person or system that can cause the
users server to stop functioning. - Ans Bomb
What does API stand for? - Ans Application Programming Interferance
____ are keywords that advertisers use to pay for and appear as sponsored links on the google
results pages. - Ans Adwords
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.