When information gatherers use methods that cross a legal or ethical threshold they are conducting?

5 Questions  |  By Mschwind | Last updated: Mar 22, 2022 | Total Attempts: 367

When information gatherers use methods that cross a legal or ethical threshold they are conducting?
When information gatherers use methods that cross a legal or ethical threshold they are conducting?
Settings

Feedback

During the Quiz End of Quiz

Difficulty

Sequential Easy First Hard First

When information gatherers use methods that cross a legal or ethical threshold they are conducting?

This is a pre-assessment quiz for Chapter 2.


  • 1. 

    Both general management and information technology management are responsible for implementing information security.

    • A. 

      True

    • B. 

      False

  • 2. 

    Information security has more to do with technology than management.

    • A. 

      True

    • B. 

      False

  • 3. 

    A deliberate act of theft would be:

    • A. 

      Equipment failure

    • B. 

      Piracy or copyright infringement

    • C. 

      Illegal confiscation of equipment or information

  • 4. 

    When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting ________________________.

    • A. 

      Industrial espionage

    • B. 

      Competitive intelligence

    • C. 

      Shoulder surfing

  • 5. 

    Unlike any other of the information technology programs, the primary mission of an information security program is to ensure that systems and their contents remain the same.

    • A. 

      True

    • B. 

      False

Do you know about user security awareness? To check your knowledge of user information security awareness, take this quiz. In this awareness program, the employees of an organization are educated about cybercrimes and other...

Questions: 20  |  Attempts: 17870   |  Last updated: Mar 22, 2022

  • Sample Question

    Why is it necessary for everyone to have a good understanding of Information Security policies and procedures?

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    It helps protect users from being victims of security incidents.

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    It provides an understanding of the patterns to follow in a security incident.

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    It helps to understand levels of responsibility.

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    All of the above.


Questions: 51  |  Attempts: 10405   |  Last updated: Mar 22, 2022

  • Sample Question

    Another name for the information security triad is:

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    The FBI triad.

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    The ISS triad.

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    The CIA triad.

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    The IST triad.


Questions: 6  |  Attempts: 5519   |  Last updated: Mar 22, 2022

  • Sample Question

    Which action below would breach the Clear Desk and Screen Policy?

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    Locking your computer when you are away from your desk

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    Leaving a departmental laptop on your desk when you are not using it or at the end of the day

    When information gatherers use methods that cross a legal or ethical threshold they are conducting?

    Locking confidential information in a cabinet

More Information Security Quizzes

When information gatherers use methods that cross a legal or ethical threshold they are conducting?
Back to top

Which of the following functions does information security perform for an organization group of answer choices?

Which of the following functions does information security perform for an organization? Protecting the organization's ability to function, Enabling the safe operation of applications implemented on the organization's IT systems, and Protecting the data the organization collects and uses.

Is an act that takes advantage of a vulnerability to compromise a controlled system?

A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders. Used as a verb, exploit refers to the act of successfully making such an attack.

Who hacks the public telephone network?

Cards In This Set.

Which consists of both information that has value to the organization and the systems and media that store process and transmit the information?

Computer assets are the focus of information security and are the information that has value to the organization, as well as the systems that store, process, and transmit the information.