A mechanism using a digital signature to prove that a

Assignment Help Marketing Management
Reference no: EM13394085

1.Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.

A. boot sector

B. file infector

C. file destroyer

D. file command

2._________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.

A. Johann Gutenberg

B. Phil Zimmerman

C. William (Bill) Gates

D. Tim Burners-Lee

3.Which of the following is NOT an example of a computer crime as listed in the textbook?

A. Data diddling

B. Salami slicing

C. Piggybacking

D. Cold calling

4.One common way to gain access to a password-protected system is to use a __________ approach.

A. back-door

B. “sneak peek”

C. brute-force

D. social engineering


5.According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.

A. 25 percent or less

B. 50 percent

C. 75 percent

D. nearly 90 percent


6.Persons who plant viruses are called:

A. computer hackers.

B. cyberterrorists.

C. vandals.

D. predators.


7.A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:

A. authentication.

B. privacy/confidentiality.

C. nonrepudiation.

D. integrity.


8.The global reach of computer networks has raised concerns over:

A. copyrights.

B. privacy.

C. security.

D. All of the above


9. encryption software allows users to ensure:

A. authentication.

B. privacy/confidentiality.

C. nonrepudiation.

D. All of the above

10.The slang term for stolen software is:

A. hackerware.

B. warez.

C. vaporware.

D. discountware.


11.__________ are the least used security technology.

A. Passwords

B. Biometrics

C. Encrypted files

D. Firewalls


12.__________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.

A. Access control software

B. Computer security software

C. Application restriction software

D. Data protection software


13.The Computer Fraud and Abuse Act of 1986 prohibited:

A. stealing or compromising data about national defense and foreign relations.

B. breaking into any electronic communications service.

C. monitoring voice communications.

D. stealing trade secrets.


14.A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.

A. information systems security plan

B. disaster recovery plan

C. infrastructure management

D. risk assessment plan


15.ECPA is an acronym that refers to the:

A. Electronic Controls Privacy Act.

B. Electronic Communications Privacy Act.

C. E-Commerce Customer Protection Association.

D. Electric Computer Protection Agency.


16.To execute denial of service attacks, intruders often use __________ computers.

A. zombie

B. monster

C. robot

D. android


17.Crimes committed against telephone company computers are an example of:

A. phreaking.

B. spoofing.

C. social engineering.

D. data diddling.


18.Examples of the ethical conundrum include all EXCEPT:

A. using computer time at work to read personal e-mail.

B. organizations compiling personal information about shopping habits.

C. the government regulating computer crimes.

D. using technology to rearrange photographs.

19.Futurist author Alvin Toffler describes three "waves of change." The third, and biggest, wave of change to occur is the:

A. Information Age.

B. Industrial Revolution.

C. Agriculture and Handwork Age.

D. Modern Age.


20.Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.

A. freaking

B. tricking

C. phishing

D. luring

Reference no: EM13394085

Questions Cloud

Prepare matthews delivery services income statement and : matthews delivery service inc. completed the following transactions during its first month of operations for january
You can either create a brochure to send out in the mail or : you can either create a brochure to send out in the mail or posters to display around town. consider your audience who
A material requirements planning mrp is most valuable in : 1 is when the activities in the stage must stop because there is no place to deposit the item just completeda.
Kingdom leasing inc incurred costs of 6500 in negotiating : kingdom leasing inc. agrees to lease jousting equipment to knight inc. on jan 1 2012. they agree on the following
A mechanism using a digital signature to prove that a : 1.viruses that attach themselves to files with certain extensions such as .doc or .exe. are viruses.a. boot sectorb.
Manufacturing overheadborealis manufacturing has just : manufacturing overheadborealis manufacturing has just completed a major change in its quality control qc process.
Resourceful productive effective and winner are the : 1.which of the following reflects the perceived fairness of an authoritys decision making?a. ethicsb. justicec. social
Imagine that someone has offered you 1000 to buy your : imagine that you own a small local clothing store along the jersey shore boardwalk and decide that you want to engage
Organizational policy to address an it-related ethical : organizational policy to address an it-related ethical issue that you wrote about in your matrix for the b1 assignment

Reviews

Write a Review

Marketing Management Questions & Answers

  Elm city market elm city market

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students.

  You are a manager in a large global manufacturing and

you are a manager in a large global manufacturing and services organization. you are trying to explain to your

  Explain why amazon clicks

Explain Why Amazon clicks and determine if it would be possible for Barnes and Noble or Borders to extend their markets in the same way that Amazon

  You will create a complete marketing plan by the end of the

throughout this class you have examined a product of the waters bottling company and addressed market concepts theories

  Explain sweet treats - target market

Explain Sweet Treats - Target Market and where is the location of your business and use one of the common segmentation methods

  Explain e-business issues

Explain E-Business Issues discuss one example of any e-Business failure and what could be done differently to prevent it from happening again

  Provide learners with the understanding and skills to

provide learners with the understanding and skills to develop marketing plans that meet marketing objectives and meet

  Explain integrated marketing concept and marketing mix

Explain Integrated Marketing Concept and Marketing Mix and should be able to analyze this is by simply taking each component of the IMC and applying your course of action throughout the flowchart

  Explain tera tech solution defense- what is the optimal

Explain Tera Tech Solution defense- what is the optimal solution and including evaluation of alternatives

  Leaders today must be able to create a compelling vision

leaders today must be able to create a compelling vision for the organization. they also must be able to create an

  What should a company consider when attempting to develop a

1.what should a company consider when attempting to develop a new product? can you think of some new products that have

  As part of the management team for ppq parts manufacturing

consider the following scenario as part of the management team for ppq parts manufacturing company you are tasked with

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd