Chapter 4: Information Ethics in Business
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of malware is designed to trick victims into giving up personal information to purchase or download useless software?

  • Ransomware
  • Sniffer
  • Spyware
  • Scareware (correct)

Which security threat involves forging the return email address to mask the actual sender?

  • Hoaxes
  • Spoofing (correct)
  • Elevation of privilege
  • Sniffer

What type of adware collects user data and transmits it without permission?

  • Scareware
  • Ransomware
  • Sniffer
  • Spyware (correct)

Which malware is a form of malicious software that demands money after infecting a computer?

<p>Ransomware (B)</p> Signup and view all the answers

What should organizations develop to outline the rules required for maintaining information security?

<p>Information security policies (D)</p> Signup and view all the answers

Which program or device can monitor data transmitted over a network?

<p>Sniffer (A)</p> Signup and view all the answers

What is the term used for the process of confirming users' identities?

<p>Authentication (B)</p> Signup and view all the answers

Which technique involves rerouting requests for legitimate websites to false websites?

<p>Pharming (D)</p> Signup and view all the answers

What type of authentication technique involves using fingerprints or voice?

<p>Something that is part of the user (B)</p> Signup and view all the answers

What is the purpose of astroturfing in the context of security?

<p>To artificially stimulate demand for a product (C)</p> Signup and view all the answers

What role do tokens play in authentication?

<p>Changing user passwords automatically (B)</p> Signup and view all the answers

Which category of authentication techniques includes a smart card or token?

<p>Something the user has (D)</p> Signup and view all the answers

What type of attack involves attackers granting themselves a higher access level to the network?

<p>Vertical privilege escalation (D)</p> Signup and view all the answers

Which technology scrambles information into an alternative form that requires a key or password to decrypt?

<p>Encryption (C)</p> Signup and view all the answers

What type of prevention technology filters content to prevent the transmission of unauthorized information?

<p>Content filtering (B)</p> Signup and view all the answers

In which situation would horizontal privilege escalation occur?

<p>When attackers grant themselves the same access levels but assume another user's identity (B)</p> Signup and view all the answers

What is the purpose of intrusion detection software?

<p>To monitor network traffic for suspicious patterns (A)</p> Signup and view all the answers

Which technology is used to guard a private network by analyzing incoming and outgoing information for correct markings?

<p>Firewalls (A)</p> Signup and view all the answers

What is a recommended way to obscure your email address when posting to a web forum or newsgroup?

<p>Insert something obvious into your email address (C)</p> Signup and view all the answers

Why is it advised not to reply to spam messages?

<p>To confirm that your email address is active (A)</p> Signup and view all the answers

What is one reason given to remove your email address from your website's pages?

<p>To prevent spammers' robots from collecting your email address (D)</p> Signup and view all the answers

What action can help in avoiding ending up on a spammer's mailing list?

<p>Offering a web-based mail form instead of displaying your email address (A)</p> Signup and view all the answers

What risk does replying to spam messages pose?

<p>Providing spammers with active email addresses (C)</p> Signup and view all the answers

What is the main focus of information ethics?

<p>Moral issues arising from information technologies (D)</p> Signup and view all the answers

Which of the following is NOT a tool to prevent information misuse as mentioned in the text?

<p>Information ethics (B)</p> Signup and view all the answers

What is the main difference between privacy and confidentiality as explained in the text?

<p>Privacy involves control over personal possessions, while confidentiality ensures authorized viewing of information. (A)</p> Signup and view all the answers

What is the purpose of an Ethical Computer Use Policy according to the text?

<p>To guide user behavior based on ethical principles (C)</p> Signup and view all the answers

Which of the following is NOT a business issue related to information ethics mentioned in the text?

<p>Privacy (B)</p> Signup and view all the answers

What is the key aspect that organizations aim for regarding ePolicies based on the text?

<p>Building a corporate culture based on ethical principles (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser