20 multi chooice

profilebigerm

Question 1

  1.  
    Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?
     

1 points  

Question 2

  1.  
    Redirecting a web link to a different address is a form of:
     

1 points  

Question 3

  1.  
    A digital certificate system:
     

1 points  

Question 4

  1.  
    Hackers create a botnet by:
     

1 points  

Question 5

  1.  
    The HIPAA Act:
     

1 points  

Question 6

  1.  
    In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
     

1 points  

Question 7

  1.  
    The most common type of electronic evidence is:
     

1 points  

Question 8

  1.  
    The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
     

1 points  

Question 9

  1.  
    ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
     

1 points  

Question 10

  1.  
    In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
     

1 points  

Question 11

  1.  
    The Federal Trade Commission FIP principle of Notice/Awareness states that:
     

1 points  

Question 12

  1.  
    A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate this situation, you might argue that stealing the food is:
     

1 points  

Question 13

  1.  
    The strength of patent protection is that it:
     

1 points  

Question 14

  1.  
    The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
     

1 points  

Question 15

  1.  
    Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
     

1 points  

Question 16

  1.  
    According to the ________, you should take the action that produces the least harm.
     

1 points  

Question 17

  1.  
    Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
     

1 points  

Question 18

  1.  
    When a cookie is created during a website visit, it is stored:
     

1 points  

Question 19

  1.  
    The "do anything anywhere" computing environment can:
     

1 points  

Question 20

  1.  
    One of the difficulties of patent protection is:
     

1 points  

 Save

    • 7 years ago
    • 5
    Answer(1)

    Purchase the answer to view it

    NOT RATED
    • attachment
      20_multiple_choice.doc