MIS CH 5

4 July 2023
4.7 (186 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
answer
true
question
To remove spyware, users need to obtain a special program that can detect and delete it.
answer
true
question
Which of the following statements is not true about intellectual property rights?
answer
The term fair use refers to the rights which creators are entitled for their work.
question
In order to safeguard your personal information, which of the following is recommended?
answer
Clear your history file when you are finished browsing.
question
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
answer
true
question
Which of the following is a federally funded Internet security research and development center?
answer
CERT/CC
question
HIPAA protects individuals against the wrongful disclosure of their health information.
answer
true
question
Audit trails only record unsuccessful access attempts.
answer
false
question
Secure sites typically use digital certificates along with security protocols.
answer
true
question
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
cyberterrorist
question
If you are nervous, a signature might not match the one on file in a signature verification system.
answer
true
question
Proximity sharing gives websites access to your current location.
answer
false
question
Which of the following copies all of the files in a computer?
answer
full backup
question
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
script kiddie
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
cracker
question
Many businesses use spyware to limit employees' web access.
answer
false
question
If a company does not have a formal email policy, it can read email messages without employee notification.
answer
true
question
Which of the following does your financial institution use to reduce fraud?
answer
signature verification system
question
Which type of individual may steal credit card numbers to make fraudulent purchases?
answer
corrupt
question
Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.
answer
true