• Home
  • Nursing Test Bank
  • Exams
    • NCLEX Exam
    • Ati Exams
  • Blog
Nursingtestbankltd Nursingtestbankltd
  • Contact us
Login / Register
Search
Wishlist
0 items / $0.00
Menu
Nursingtestbankltd
Search
0 items $0.00
Click to enlarge
Home information system Information Technology For Managers 2nd Edition By by George Reynolds – Test Bank
Information Technology Auditing 4th Edition By James A.Hall - Test Bank
Information Technology Auditing 4th Edition By James A.Hall - Test Bank Suggested Price: $25.00
Back to products
Information Technology for the Health Professions 4th Edition By Lillian Burke - Test Bank
Information Technology for the Health Professions 4th Edition By Lillian Burke - Test Bank Suggested Price: $25.00

Information Technology For Managers 2nd Edition By by George Reynolds – Test Bank

Suggested Price: $25.00

Edition: 2nd Edition

Format: Downloadable ZIP File

Resource Type: Test bank

Duration: Unlimited downloads

Delivery: Instant Download

Add to wishlist
Add to wishlist
Compare
Category: information system
Share:
  • Description
  • Reviews (0)
Description

Information Technology For Managers 2nd Edition By by George Reynolds – Test Bank

CHAPTER 11—CYBERCRIME AND IT SECURITY

 

MULTIPLE CHOICE

 

  1. Identify a true statement about the bring your own device (BYOD)business policy.
  2. It can improve employee productivity.
  3. It can provide data security.
  4. It createsa bug-free environment.
  5. It enhances employee interaction.

 

ANS: A

RATIONALE: Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet. Proponents of BYOD say it improves employee productivity by allowing workers to use devices with which they are already familiar—while also helping to create an image of a company as a flexible and progressive employer.

 

  1. Which of the following is a drawback of the bring your own device (BYOD)business policy?
  2. It affects the productivity of the employees of a company.
  3. It inhibits the privacy of the employees of a company.
  4. It exposes a company’s data to malware.
  5. It creates the image of a company as not being flexible.

 

ANS: C

RATIONALE: Most companies have found they cannot entirely prevent employees from using their own devices to perform work functions. However, this practice raises many potential security issues as it is highly likely that such devices are also used for nonwork activity (browsing Web sites, blogging, shopping, visiting social networks, etc.) that exposes them to malware much more frequently than a device used strictly for business purposes.

 

  1. In computing, a(n)_____ is an attack on an information system that takes advantage of a particular system vulnerability.
  2. exit door
  3. glitch
  4. bot
  5. exploit

 

ANS: D

RATIONALE: In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. Often this attack is due to poor system design or implementation. Once the vulnerability is discovered, software developers create and issue a “fix,” or patch, to eliminate the problem.

 

  1. Which of the following iscreated and issuedby software engineers to remove a system vulnerability?
  2. A patch
  3. A key
  4. A license
  5. A constraint

 

ANS: A

RATIONALE: Once a vulnerability is discovered, software developers create and issue a “fix,” or patch, to eliminate the problem. Users of the system or application are responsible for obtaining and installing the patch, which they can usually download from the Web.

 

  1. The attack that takes place before a software developer knows about the vulnerability is known as a(n) _____.
  2. unidentified attack
  3. zero-day attack
  4. exploit
  5. threat

 

ANS: B

RATIONALE: It is difficult to keep up with all the required patches to fix vulnerabilities. Of special concern is a zero-day attack that takes place before the security community or software developer knows about the vulnerability or has been able to repair it.

 

  1. Which perpetrator violates computer or Internet security maliciously for illegal personal gain?
  2. A red hat hacker
  3. A gray hat hacker
  4. A white hat hacker
  5. A black hat hacker

 

ANS: D

RATIONALE: A black hat hacker is someone who violates computer or Internet security maliciously or for illegal personal gain (in contrast to a white hat hacker who is someone who has been hired by an organization to test the security of its information systems). He breaks into secure networks to destroy, modify, or steal data.

 

  1. Which of the following best describes malicious insiders?
  2. Theyhack computers in an attempt to promote a political ideology.
  3. They disrupta company’s information systems and business operations.
  4. Theyarehired by an organization to test the security of its information systems.
  5. Theyare hired by an organization to test the security of another organization’s information systems.

 

ANS: B

RATIONALE: A malicious insider is an employee or contractor who attempts to gain financially and/or disrupt a company’s information systems and business operations. He or she has inside information concerning the organization’s security practices, data, or computer systems.

 

  1. Those who capture trade secrets and attempt to gain an unfair competitive advantage are known as _____.
  2. white hat hackers
  3. hacktivists
  4. industrial spies
  5. black hat hackers

 

ANS: C

RATIONALE: Industrial spies are individuals who capture trade secrets and attempt to gain an unfair competitive advantage. They are usually hired by organizations or individuals to illegally gain data and access to other organization’s trade secrets.

 

  1. Which of the following is true of white hat hackers?
  2. They are hired by an organization to test the security of its information systems.
  3. They disrupt a company’s information systems and business operations.
  4. They capture trade secrets and attempt to gain an unfair competitive advantage in a company.
  5. They destroy the infrastructure components of governments, financial institutions, and emergency response units.

 

ANS: A

RATIONALE:White hat hackersare people who have been hired by an organization to test the security of its information systems. They use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.

Related

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Information Technology For Managers 2nd Edition By by George Reynolds – Test Bank” Cancel reply

Your email address will not be published. Required fields are marked *

Related products

Add to cart
Quick view
Compare
Add to wishlist

INFORMATION SYSTEMS TODAY MANAGING THE DIGITAL WORLD, 8E JOSEPH – TEST BANK

information system
Suggested Price: $25.00
Add to cart
Quick view
Compare
Add to wishlist

Information Technology Auditing 4th Edition By James A.Hall – Test Bank

information system
Suggested Price: $25.00
Add to cart
Quick view
Compare
Add to wishlist

Information Technology Auditing 4e James A Hall

information system
Suggested Price: $25.00
Add to cart
Quick view
Compare
Add to wishlist

Information Systems Today 7th Edition by Valacich – Test Bank

information system
Suggested Price: $25.00
Add to cart
Quick view
Compare
Add to wishlist

Information Technology Project Management 8th Edition Kathy Schwalbe

information system
Suggested Price: $25.00

Nursingtestbankltd

  • 100 E San Fernando St, San Jose, CA 95112, United States
  • Whatsapp: +1-6269466008
  • Email: Nursingtestbankltd@gmail.com

Useful links
  • FAQs
  • Privacy Policy
  • Terms & Conditions
  • Contact Us
Categories
  • Nursing Test Bank
  • NCLEX Exam
Pages
  • Home
  • Nursing Test Bank
  • Exams
    • NCLEX Exam
    • Ati Exams
  • Blog
Recent post
  • Digitization of Test Banks in the 21st Century
  • Nursing Test Bank: The Guide to Excellence
Nursingtestbankltd
payments
  • Menu
  • Categories
  • Nursing Test Bank
  • NCLEX Exam
  • Home
  • Nursing Test Bank
  • Exams
    • NCLEX Exam
    • Ati Exams
  • Blog
  • Wishlist
  • Login / Register
Shopping cart
Close
Sign in
Close

Lost your password?

No account yet?

Create an Account
Start typing to see products you are looking for.
Shop
Wishlist
0 items Cart
My account

Do you need any help?

Select at least 2 products
to compare

View comparison