02 pts a monitoring software that records a users keystrokes a software that

02 pts a monitoring software that records a users

This preview shows page 908 - 911 out of 998 pages.

0/2 pts a monitoring software that records a user's keystrokes a software that prevents fraudsters from hacking into e-mail accounts a program that controls permissions for web traffic into and out of a computer network a process which helps a user increase productivity by tracking the keys entered by him - LO5 0/6 pts 0% - Which of the following is a reason why humans are soft targets for social engineering? 0/2 pts respect for authority need for privacy need for anonymity desire to be disconnected from others - Adopting which among the following measures makes it most difficult for a hacker to break into passwords? 908 ScholarStock
Image of page 908
0/2 pts creating easy to remember passwords maintaining a single, secure password for all accounts creating passwords with symbols, mixed cases, and characters reusing the password in news and games sites through multiple systems - Which of the following is a provision of the State Security Breach Notification Laws? 0/2 pts They prohibit businesses from sending misleading or deceptive commercial e-mails. They require companies to provide "opt-out" choices before transferring personal data to third parties. They include provisions to protect the privacy and security of individually identifiable health information. They require organizations to inform state residents if sensitive data are released. Which of the following is an accurate description of the Privacy Act of 1974? 0/2 pts It prohibits businesses from sending misleading or deceptive commercial e-mails but denies recipients any legal recourse on their own. It requires organizations to notify state residents if sensitive data are released. It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies. It stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually. 909 ScholarStock
Image of page 909
Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information? 0/2 pts prohibiting public access to the company's website prohibiting downloading data to USB drives prohibiting entry of employees in shared workspaces restricting employee access to official mails Which of the following is a feature of public key encryption? 0/2 pts uses a duplication process to replicate keys uses a pair of keys, one to encrypt the data and the other to decrypt data uses a single point key to encrypt and decrypt data uses multiple number of keys accessible to all members of an organization Which of the following principles is consistent with the utilitarian ethical framework? 2/2 pts "Thou shalt not kill" "Liberté, égalité, fraternité" "Protect free speech" "First, do no harm" - Which of the following statements is true of natural laws and rights?
Image of page 910
Image of page 911

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture