business mid term

Is this your test? Login to manage it. If not, you can make a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
authentication and authorization, prevention and resistance, and detection and response are the 3 primary _______ _________ security areas.
2.
1 point
phishing
3.
1 point
privacy
4.
1 point
organizations cannot be held financially responsible for their employees’ actions
5.
1 point
tokens
6.
1 point
the best and most effective way to manage authentication is:
7.
1 point

identity theft
8.
1 point
key logger or key trapper software, hardware key logger, cookie, adware, spyware, web log, and clickstream are examples of what?
9.
1 point
the most secure type of authentication involves
something the user ____, something the user ____, and something that is part of the user.
answer is separated by 'and'
10.
1 point
social media policy
11.
1 point
internet use policy
12.
1 point
employee monitoring policy
13.
1 point
organizations strive to build a corporate culture based on ethical principles that employees can understand and implement
14.
1 point
content filtering
15.
1 point
acting ethically and legally are always the same
16.
1 point
acceptable use policy (aup)
17.
1 point
one of the most common defenses for preventing a security breach is content filtering
18.
1 point
confidentiality
19.
1 point
smart card
20.
1 point
information privacy policy
21.
1 point
information technology monitoring
22.
1 point
there are five primary information technology security areas
23.
1 point
insiders, social engineering, dumpster diving are a threat to ______ security.
24.
1 point
if there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it
25.
1 point
authenticatior
26.
1 point
information ethics
27.
1 point
nonrepudiation
28.
1 point
information management, information governance, information compliance, and ediscovery are tools to help:
29.
1 point
ethical computer use policy
30.
1 point
one of the most common defenses for preventing a security breach is content filtering
31.
1 point
spam spam spam
32.
1 point
anti-spam policy
33.
1 point
authorization
34.
1 point
firewall
35.
1 point
pharming
36.
1 point
biometrics
37.
1 point
email privacy policy
38.
1 point
intrusion detection software
39.
1 point
ethics