MCQs > Admin Support > Human Resource Information Systems MCQs > HRIS Privacy and Security MCQs

HRIS Privacy and Security MCQ

Worms is a stand-alone _______ that are meant to disrupt computer and network operations

Answer

Correct Answer: Software programs

Note: This Question is unanswered, help us to find answer for this one

According to the U.S. Fair Labor Standards Act workers can work under ______ in a week.

Answer

Correct Answer: 40hours

Note: This Question is unanswered, help us to find answer for this one

The disclosure of employee information to third parties without the permission of the employee is known as ______ .

Answer

Correct Answer: Unauthorized disclosure

Note: This Question is unanswered, help us to find answer for this one

To access employee (or other types) of data without ______ .

Answer

Correct Answer: Both a & b

Note: This Question is unanswered, help us to find answer for this one

A type of malware that hides inside email attachments or files and infects a user’s computer when it is opened and/or executed is known as _______ .

Answer

Correct Answer: Trojan

Note: This Question is unanswered, help us to find answer for this one

To regard an individual negatively or with disapproval is known as _____ .

Answer

Correct Answer: Stigmatized

Note: This Question is unanswered, help us to find answer for this one

The state in which data are currently residing. It can be in storage , in process , or in transmission is known as ______.

Answer

Correct Answer: State of information

Note: This Question is unanswered, help us to find answer for this one

Spyware is a ______ on a computer that gathers information about a user’s activities on the Web and transmits it to third parties

Answer

Correct Answer: Software installed

Note: This Question is unanswered, help us to find answer for this one

Illegal access to private data, services, networks, or devices by getting around security protections is known as ______ .

Answer

Correct Answer: Security breaches

Note: This Question is unanswered, help us to find answer for this one

Which type of virus hides in the operating system and causes viruses to appear as necessary files.

Answer

Correct Answer: Rootkit

Note: This Question is unanswered, help us to find answer for this one

Ransomware involves locking and access to a system or files until a ransom is paid to the hacker.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Phishing is attempting to acquire, _______ by appearing to look like an authentic source with which the victim does business.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

A graphical model, or framework, of the architectural approach used when establishing or evaluating organizational security measures is known as ______ .

Answer

Correct Answer: McCumber Cube

Note: This Question is unanswered, help us to find answer for this one

Malware refers to malicious software whose primary purpose is to infiltrate a user’s machine without his/her knowledge.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

An internationally agreed-upon set of standards governing information security management is known as ______ .

Answer

Correct Answer: ISO/IEC 27000

Note: This Question is unanswered, help us to find answer for this one

Information security is ensuring the confidentiality, integrity, and availability of information.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Hacker is an individual who accesses a computer or computer network unlawfully.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

GDPR stands for _____ .

Answer

Correct Answer: General Data Protection Regulation

Note: This Question is unanswered, help us to find answer for this one

Employees who have grievances against an employer and who believe that these grievances cannot be resolved is known as ______ .

Answer

Correct Answer: Disgruntled employees

Note: This Question is unanswered, help us to find answer for this one

Desired information goals Ensuring that data are kept confidential, have not been manipulated, and are available to those who are authorized to access it.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Which technique attempts to make a computer, network, or service unavailable for legitimate users .

Answer

Correct Answer: Denial-of-service

Note: This Question is unanswered, help us to find answer for this one

Define data accuracy .

Answer

Correct Answer: The extent to which the value stored for an object is correct.

Note: This Question is unanswered, help us to find answer for this one

Cyber-terrorism is a politically motivated use of technology to do severe harm or disruption in society

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Identification of mechanisms that can be used to protect data is known as _______ .

Answer

Correct Answer: Countermeasures

Note: This Question is unanswered, help us to find answer for this one

Computer virus is a software program that _______ into another program and causes harm to a computer by altering data, erasing files, or other damage.

Answer

Correct Answer: Inserts a copy of itself

Note: This Question is unanswered, help us to find answer for this one