20 multi chooice

Question 1 Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?Answer client computer  internal corporate back-end system corporate servers  communications lines 1 points  Question 2 Redirecting a web link to a different address is a form of:Answer war driving sniffing spoofing snooping 1 points  Question 3 A digital certificate system:Answer uses tokens to validate a user’s identity uses third-party CAs to validate a user’s identity uses digital signatures to validate a user’s identity is used primarily by individuals for personal correspondence 1 points  Question 4 Hackers create a botnet by:Answer infecting web search bots with malware infecting corporate servers with “zombie” Trojan horses that allow undetected access through a back door using web search bots to infect other computers causing other people’s computers to become “zombie” PCs following a master computer 1 points  Question 5 The HIPAA Act:Answer imposes responsibility on companies and management to safeguard the accuracy of financial information specifies best practices in information systems security and control outlines medical security and privacy rules requires financial institutions to ensure the security of customer data 1 points  Question 6 In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor’s site, a small program called Mitglieder was downloaded to the user’s machine. The program enabled outsiders to infiltrate the user’s machine. What type of malware is this an example of?Answer Trojan horse spyware virus worm 1 points  Question 7 The most common type of electronic evidence is:Answer email voice-mail spreadsheets instant messages 1 points  Question 8 The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:Answer recovery-oriented computing fault tolerant computing high availability computing disaster recovery planning 1 points  Question 9 ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.Answer “Controls” “Benchmarking” “Security” “Algorithms” 1 points  Question 10 In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?Answer application proxy filtering intrusion detection system stateful inspection packet filtering 1 points  Question 11 The Federal Trade Commission FIP principle of Notice/Awareness states that:Answer customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction Websites must disclose their information practices before collecting data data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use there is a mechanism in place to enforce FIP principles 1 points  Question 12 A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate this situation, you might argue that stealing the food is:Answer wrong, because if everyone were to do this, the concept of personal property is defeated.  acceptable, because the higher value is the survival of the family wrong, because the man would not want the grocer to steal from him acceptable, because the grocer suffers the least harm 1 points  Question 13 The strength of patent protection is that it:Answer allows protection from internet theft of ideas put forth publicly puts the strength of law behind copyright is easy to define grants a monopoly on underlying concepts and ideas 1 points  Question 14 The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.Answer PGP  COPPA  P3P  safe-harbor  1 points  Question 15 Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?Answer Freedom of Information Act Gramm-Leach-Bliley Act Privacy Protection Act HIPAA 1 points  Question 16 According to the ________, you should take the action that produces the least harm.Answer categorical imperative  utilitarian principle  risk aversion principle  golden rule  1 points  Question 17 Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?Answer information rights and obligations system quality property rights and obligations accountability and control 1 points  Question 18 When a cookie is created during a website visit, it is stored:Answer in a web directory on the website computer on the visitor’s computer on the ISP’s computer 1 points  Question 19 The “do anything anywhere” computing environment can:Answer make work environments much more pleasant blur the traditional boundaries between work and family time create economies of efficiency centralize power at corporate headquarters 1 points  Question 20 One of the difficulties of patent protection is:Answer the years of waiting to receive it that only the underlying ideas are protected preventing the ideas from falling into public domain digital media cannot be patented 1 points   Save

Don't use plagiarized sources. Get Your Custom Essay on
20 multi chooice
Just from $13/Page
Order Essay
Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat 1 763 309 4299EmailWhatsApp

Order your essay today and save 15% with the discount code GINGER