Worms is a stand-alone _______ that are meant to disrupt computer and network operations
Answer
Correct Answer:
Software programs
Note: This Question is unanswered, help us to find answer for this one
According to the U.S. Fair Labor Standards Act workers can work under ______ in a week.
Answer
Correct Answer:
40hours
Note: This Question is unanswered, help us to find answer for this one
The disclosure of employee information to third parties without the permission of the employee is known as ______ .
Answer
Correct Answer:
Unauthorized disclosure
Note: This Question is unanswered, help us to find answer for this one
To access employee (or other types) of data without ______ .
Answer
Correct Answer:
Both a & b
Note: This Question is unanswered, help us to find answer for this one
A type of malware that hides inside email attachments or files and infects a user’s computer when it is opened and/or executed is known as _______ .
Answer
Correct Answer:
Trojan
Note: This Question is unanswered, help us to find answer for this one
To regard an individual negatively or with disapproval is known as _____ .
Answer
Correct Answer:
Stigmatized
Note: This Question is unanswered, help us to find answer for this one
The state in which data are currently residing. It can be in storage , in process , or in transmission is known as ______.
Answer
Correct Answer:
State of information
Note: This Question is unanswered, help us to find answer for this one
Spyware is a ______ on a computer that gathers information about a user’s activities on the Web and transmits it to third parties
Answer
Correct Answer:
Software installed
Note: This Question is unanswered, help us to find answer for this one
Illegal access to private data, services, networks, or devices by getting around security protections is known as ______ .
Answer
Correct Answer:
Security breaches
Note: This Question is unanswered, help us to find answer for this one
Which type of virus hides in the operating system and causes viruses to appear as necessary files.
Answer
Correct Answer:
Rootkit
Note: This Question is unanswered, help us to find answer for this one
Ransomware involves locking and access to a system or files until a ransom is paid to the hacker.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Phishing is attempting to acquire, _______ by appearing to look like an authentic source with which the victim does business.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
A graphical model, or framework, of the architectural approach used when establishing or evaluating organizational security measures is known as ______ .
Answer
Correct Answer:
McCumber Cube
Note: This Question is unanswered, help us to find answer for this one
Malware refers to malicious software whose primary purpose is to infiltrate a user’s machine without his/her knowledge.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
An internationally agreed-upon set of standards governing information security management is known as ______ .
Answer
Correct Answer:
ISO/IEC 27000
Note: This Question is unanswered, help us to find answer for this one
Information security is ensuring the confidentiality, integrity, and availability of information.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Hacker is an individual who accesses a computer or computer network unlawfully.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
GDPR stands for _____ .
Answer
Correct Answer:
General Data Protection Regulation
Note: This Question is unanswered, help us to find answer for this one
Employees who have grievances against an employer and who believe that these grievances cannot be resolved is known as ______ .
Answer
Correct Answer:
Disgruntled employees
Note: This Question is unanswered, help us to find answer for this one
Desired information goals Ensuring that data are kept confidential, have not been manipulated, and are available to those who are authorized to access it.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Which technique attempts to make a computer, network, or service unavailable for legitimate users .
Answer
Correct Answer:
Denial-of-service
Note: This Question is unanswered, help us to find answer for this one
Define data accuracy .
Answer
Correct Answer:
The extent to which the value stored for an object is correct.
Note: This Question is unanswered, help us to find answer for this one
Cyber-terrorism is a politically motivated use of technology to do severe harm or disruption in society
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Identification of mechanisms that can be used to protect data is known as _______ .
Answer
Correct Answer:
Countermeasures
Note: This Question is unanswered, help us to find answer for this one
Computer virus is a software program that _______ into another program and causes harm to a computer by altering data, erasing files, or other damage.
Answer
Correct Answer:
Inserts a copy of itself
Note: This Question is unanswered, help us to find answer for this one