1. Worms is a stand-alone _______ that are meant to disrupt computer and network operations
Answer
Correct Answer:
Software programs
Note: This Question is unanswered, help us to find answer for this one
2. According to the U.S. Fair Labor Standards Act workers can work under ______ in a week.
Answer
Correct Answer:
40hours
Note: This Question is unanswered, help us to find answer for this one
3. The disclosure of employee information to third parties without the permission of the employee is known as ______ .
Answer
Correct Answer:
Unauthorized disclosure
Note: This Question is unanswered, help us to find answer for this one
4. To access employee (or other types) of data without ______ .
Answer
Correct Answer:
Both a & b
Note: This Question is unanswered, help us to find answer for this one
5. A type of malware that hides inside email attachments or files and infects a user’s computer when it is opened and/or executed is known as _______ .
Answer
Correct Answer:
Trojan
Note: This Question is unanswered, help us to find answer for this one
6. To regard an individual negatively or with disapproval is known as _____ .
Answer
Correct Answer:
Stigmatized
Note: This Question is unanswered, help us to find answer for this one
7. The state in which data are currently residing. It can be in storage , in process , or in transmission is known as ______.
Answer
Correct Answer:
State of information
Note: This Question is unanswered, help us to find answer for this one
8. Spyware is a ______ on a computer that gathers information about a user’s activities on the Web and transmits it to third parties
Answer
Correct Answer:
Software installed
Note: This Question is unanswered, help us to find answer for this one
9. Illegal access to private data, services, networks, or devices by getting around security protections is known as ______ .
Answer
Correct Answer:
Security breaches
Note: This Question is unanswered, help us to find answer for this one
10. Which type of virus hides in the operating system and causes viruses to appear as necessary files.
Answer
Correct Answer:
Rootkit
Note: This Question is unanswered, help us to find answer for this one
11. Ransomware involves locking and access to a system or files until a ransom is paid to the hacker.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
12. Phishing is attempting to acquire, _______ by appearing to look like an authentic source with which the victim does business.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
13. A graphical model, or framework, of the architectural approach used when establishing or evaluating organizational security measures is known as ______ .
Answer
Correct Answer:
McCumber Cube
Note: This Question is unanswered, help us to find answer for this one
14. Malware refers to malicious software whose primary purpose is to infiltrate a user’s machine without his/her knowledge.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
15. An internationally agreed-upon set of standards governing information security management is known as ______ .
Answer
Correct Answer:
ISO/IEC 27000
Note: This Question is unanswered, help us to find answer for this one
16. Information security is ensuring the confidentiality, integrity, and availability of information.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
17. Hacker is an individual who accesses a computer or computer network unlawfully.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
18. GDPR stands for _____ .
Answer
Correct Answer:
General Data Protection Regulation
Note: This Question is unanswered, help us to find answer for this one
19. Employees who have grievances against an employer and who believe that these grievances cannot be resolved is known as ______ .
Answer
Correct Answer:
Disgruntled employees
Note: This Question is unanswered, help us to find answer for this one
20. Desired information goals Ensuring that data are kept confidential, have not been manipulated, and are available to those who are authorized to access it.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
21. Which technique attempts to make a computer, network, or service unavailable for legitimate users .
Answer
Correct Answer:
Denial-of-service
Note: This Question is unanswered, help us to find answer for this one
22. Define data accuracy .
Answer
Correct Answer:
The extent to which the value stored for an object is correct.
Note: This Question is unanswered, help us to find answer for this one
23. Cyber-terrorism is a politically motivated use of technology to do severe harm or disruption in society
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
24. Identification of mechanisms that can be used to protect data is known as _______ .
Answer
Correct Answer:
Countermeasures
Note: This Question is unanswered, help us to find answer for this one
25. Computer virus is a software program that _______ into another program and causes harm to a computer by altering data, erasing files, or other damage.
Answer
Correct Answer:
Inserts a copy of itself
Note: This Question is unanswered, help us to find answer for this one
Human Resource Information Systems MCQs | Topic-wise