Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
20 multi chooice
- Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?
Answer
client computer internal corporate back-end system corporate servers communications lines1 points
Question 2- Redirecting a web link to a different address is a form of:
Answer
war driving sniffing spoofing snooping1 points
Question 3- A digital certificate system:
Answer
uses tokens to validate a user's identity uses third-party CAs to validate a user's identity uses digital signatures to validate a user's identity is used primarily by individuals for personal correspondence1 points
Question 4- Hackers create a botnet by:
Answer
infecting web search bots with malware infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door using web search bots to infect other computers causing other people's computers to become "zombie" PCs following a master computer1 points
Question 5- The HIPAA Act:
Answer
imposes responsibility on companies and management to safeguard the accuracy of financial information specifies best practices in information systems security and control outlines medical security and privacy rules requires financial institutions to ensure the security of customer data1 points
Question 6- In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
Answer
Trojan horse spyware virus worm1 points
Question 7- The most common type of electronic evidence is:
Answer
email voice-mail spreadsheets instant messages1 points
Question 8- The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
Answer
recovery-oriented computing fault tolerant computing high availability computing disaster recovery planning1 points
Question 9- ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
Answer
"Controls" "Benchmarking" "Security" "Algorithms"1 points
Question 10- In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
Answer
application proxy filtering intrusion detection system stateful inspection packet filtering1 points
Question 11- The Federal Trade Commission FIP principle of Notice/Awareness states that:
Answer
customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction Websites must disclose their information practices before collecting data data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use there is a mechanism in place to enforce FIP principles1 points
Question 12- A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate this situation, you might argue that stealing the food is:
Answer
wrong, because if everyone were to do this, the concept of personal property is defeated. acceptable, because the higher value is the survival of the family wrong, because the man would not want the grocer to steal from him acceptable, because the grocer suffers the least harm1 points
Question 13- The strength of patent protection is that it:
Answer
allows protection from internet theft of ideas put forth publicly puts the strength of law behind copyright is easy to define grants a monopoly on underlying concepts and ideas1 points
Question 14- The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
Answer
PGP COPPA P3P safe-harbor1 points
Question 15- Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
Answer
Freedom of Information Act Gramm-Leach-Bliley Act Privacy Protection Act HIPAA1 points
Question 16- According to the ________, you should take the action that produces the least harm.
Answer
categorical imperative utilitarian principle risk aversion principle golden rule1 points
Question 17- Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
Answer
information rights and obligations system quality property rights and obligations accountability and control1 points
Question 18- When a cookie is created during a website visit, it is stored:
Answer
in a web directory on the website computer on the visitor's computer on the ISP's computer1 points
Question 19- The "do anything anywhere" computing environment can:
Answer
make work environments much more pleasant blur the traditional boundaries between work and family time create economies of efficiency centralize power at corporate headquarters1 points
Question 20- One of the difficulties of patent protection is:
Answer
the years of waiting to receive it that only the underlying ideas are protected preventing the ideas from falling into public domain digital media cannot be patented1 points
Save
- One of the difficulties of patent protection is:
- The "do anything anywhere" computing environment can:
- When a cookie is created during a website visit, it is stored:
- Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
- According to the ________, you should take the action that produces the least harm.
- Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
- The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
- The strength of patent protection is that it:
- A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate this situation, you might argue that stealing the food is:
- The Federal Trade Commission FIP principle of Notice/Awareness states that:
- In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
- ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
- The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
- The most common type of electronic evidence is:
- In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
- The HIPAA Act:
- Hackers create a botnet by:
- A digital certificate system:
- Redirecting a web link to a different address is a form of:
- @
- 82 orders completed
- ANSWER
-
Tutor has posted answer for $10.00. See answer's preview
* have **** **** workPlease check **