100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
BCIS 1405 Exam | Questions with 100% Solutions| Verified| Latest Update $13.49   Add to cart

Exam (elaborations)

BCIS 1405 Exam | Questions with 100% Solutions| Verified| Latest Update

 0 view  0 purchase
  • Course
  • BCIS 1405
  • Institution
  • BCIS 1405

Three reasons why organizations should develop written epolicies: - Ans -Establish employee guidelines -Estab employee procedures - Estab organizational rules Info ___ is a broad term encompassing the protection of info from accidental or intentional misuse by persons inside or outside an orga...

[Show more]

Preview 4 out of 33  pages

  • August 29, 2024
  • 33
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • BCIS 1405
  • BCIS 1405
avatar-seller
KenAli
BCIS 1405 Exam | Questions with 100%
Solutions| Verified| Latest Update
Three reasons why organizations should develop written epolicies: - Ans -Establish
employee guidelines
-Estab employee procedures
- Estab organizational rules



Info ___ is a broad term encompassing the protection of info from accidental or
intentional misuse by persons inside or outside an organization. - Ans Security



What scrambles info into an alternative form that requires a key or password to decrypt? - Ans
Encryption


Which policy stating explicit how , when and where the company monitors its employees?


- Employee monitoring policy
- Email monitoring policy
- Info monitoring policy. - Ans - Employee monitoring policy


____ is the assurance that messages and info remain available only to those authorized to view
them. - Ans Confidentiality


Three Epolicies: - Ans - Ethical computer use policy

- Acceptable use policy
- Social Media policy


____ is an anti spamming approach where the receiving computer launches a return attack
against the spammer, sending email messages back to the computer that originated
the suspected spam. - Ans Teergrubing

,What software has purporting to serve some useful function and often fulfilling the function,
also allows internet advertisers to display advertisements without the consent of the computer
user?


-Ransomware

- Hoax
- Adware
-Spyware - Ans - Adware


An info ___ policy contains general principles regarding into privacy. - Ans Privacy



which policy allows employees to use their personal mobile devices and computers to access
enterprise data and a - Ans Bring your own device policy



___ is the right to be left alone when you want to be, to have control over your
personal possessions, and not to be observed without your consent. - Ans Privacy



Technique to gain personal info for purposes to identify theft, usually by means of
fraudulent emails that look as though they came from legitimate business. - Ans Phising


Three categories of authentication and authorization. - Ans - something the user has
- something that is part of the user
- something the user knows



What is hardware and/or software that guard a private network by analyzing an incoming
and outgoing information for the correct markings? - Ans Firewall


____-factor authentication requires the user to provide two means of authentication, what the
user knows (password) and what the user has (security token) - Ans Two

,____ is unsolicited email. - Ans Spam


What is a user doing when they choose to allow permissions to incoming emails. - Ans Opt-in


_____ is a form of social engineering in which one individual lies to obtain confidential data
about another individual. - Ans Pretexing



What is the theft of a website's name that occurs when someone, posing a site's administrator,
changes the ownership of the domain name assigned to the website to another website owner?
- Ans Website name stealing



What is the use of computer and networking tech against persons or property to intimidate or
coerce governments, individuals or any segment of society to attain political religious or
ideological goals? - Ans Cyberterrorism


____ is a special class of adware that collects data about the user and transmits over the
internet without the user's knowledge or permission. - Ans Spyware



What is a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering the
office or organization that owns the network? - Ans Drive-by-hacking



Two items typically contained in an employee monitoring policy. - Ans - Always enforce the
policy the same for everyone
- State the consequences of violating the policy.



What is the traditional security process, which requires a user name and password? - Ans
Single-factor authentication


____ are experts in tech who use their knowledge to break into computers and computer
networks, either for profit or just motivated by the challenge. - Ans Hackers

, What is the science that studies encryption, which is the hiding of messages so that only
the sender and recover can read them. - Ans Cryptography


_____ key encryption uses two keys: a public key that everyone can have and a private key for
only the recipient. - Ans Public


Software that is manufactured to look like the real thing and sold as such?


- Counterfeit software
- Info compliance
- Pirated Software

-Intellectual property - Ans - Counterfeit software


What details how an organization will implement the info security policies?

- info defense policy
- dumpster diving policy
- social engineering plan
- info security plan - Ans - info security plan



Whats the problem when someone registers purposely misspelled variations of well-known
domain names? - Ans Typosquatting


A mail ____ sends a massive amount of email to a specific person or system that can cause the
users server to stop functioning. - Ans Bomb


What does API stand for? - Ans Application Programming Interferance


____ are keywords that advertisers use to pay for and appear as sponsored links on the google
results pages. - Ans Adwords

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85169 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart