89%(104)93 out of 104 people found this document helpful
This preview shows page 908 - 911 out of 998 pages.
0/2 ptsa monitoring software that records a user's keystrokesa software that prevents fraudsters from hacking into e-mail accountsa program that controls permissions for web traffic into and out of a computer networka process which helps a user increase productivity by tracking the keys entered by him-LO50/6 pts0%-Which of the following is a reason why humans are soft targets for social engineering?0/2 ptsrespect for authorityneed for privacyneed for anonymitydesire to be disconnected from others-Adopting which among the following measures makes it most difficult for a hacker to break into passwords?908ScholarStock
0/2 ptscreating easy to remember passwordsmaintaining a single, secure password for all accountscreating passwords with symbols, mixed cases, and charactersreusing the password in news and games sites through multiple systems-Which of the following is a provision of the State Security Breach Notification Laws?0/2 ptsThey prohibit businesses from sending misleading or deceptive commercial e-mails.They require companies to provide "opt-out" choices before transferring personal data to third parties.They include provisions to protect the privacy and security of individually identifiable health information.They require organizations to inform state residents if sensitive data are released.Which of the following is an accurate description of the Privacy Act of 1974?0/2 ptsIt prohibits businesses from sending misleading or deceptive commercial e-mails but denies recipients any legal recourse on their own.It requires organizations to notify state residents if sensitive data are released.It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies.It stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually.909ScholarStock
Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information?0/2 ptsprohibiting public access to the company's websiteprohibiting downloading data to USB drivesprohibiting entry of employees in shared workspacesrestricting employee access to official mailsWhich of the following is a feature of public key encryption?0/2 ptsuses a duplication process to replicate keysuses a pair of keys, one to encrypt the data and the other to decrypt datauses a single point key to encrypt and decrypt datauses multiple number of keys accessible to all members of an organizationWhich of the following principles is consistent with the utilitarian ethical framework?2/2 pts"Thou shalt not kill""Liberté, égalité, fraternité""Protect free speech""First, do no harm"-Which of the following statements is true of natural laws and rights?