Refer a friend and get % off! They'll get % off too.

CIS 207T Week 5 WileyPLUS Weekly Exam

CIS 207T Week 5 WileyPLUS Weekly Exam

For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.

Complete this graded exam by doing the following:

1. Click the link to begin the graded exam.

2. Read the exam policies carefully.

3. Click the Next button to begin the exam.

4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.

Question 1

The law basically does not support an employer’s right to read electronic mail and other electronic documents.

True

False

Question 2

Privacy regulations are basically the same from country to country around the world.

True

False

Question 3

______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

Profiling

Information privacy

A digital dossier

Privacy

Question 4

______________ is an electronic profile of you and your habits.

Privacy

Information privacy

Profiling

A digital dossier

Question 5

______________ is the process of forming a digital dossier.

Privacy

Profiling

Dossiering

Information privacy

Question 6

Which of the following is NOT an example of a profiler?

Amazon

ChoicePoint

LexisNexis

Acxiom

Question 7

The right of privacy ___________ absolute.

cannot be

can be

is not

is

Question 8

Risk management identifies, controls, and minimizes the impact of threats to the organization’s information security.

True

False

Question 9

Which if the following is not a common risk mitigation strategy?

Risk analysis.

Risk limitation.

Risk acceptance.

Risk transference.

Question 10

Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?

It is difficult, if not impossible, for organization to provide perfect security for their data.

China is the leading hacking group that encourages similar behavior from other countries.

It appears that it is impossible to secure the Internet.

There is a growing danger that countries are engaging in economic cyberwarfare among themselves.

Question 11

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

Espionage

Information extortion

Competitive intelligence

Intellectual property

Question 12

Phishing is an example of __________.

Copyright infringement

Espionage

Software attack

Sabotage

Question 13

You start browsing your favorite home improvement company’s website and notice someone has changed all the logos to their main competitor’s logos. This is an example of ___________.

Espionage

Identity theft

Information extortion

Sabotage

Question 14

Application software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs.

True

False

Question 15

Software consists of the instructions given to computer hardware.

True

False

Question 16

Application software is a set of computer instructions that provide specific functionality for a user.

True

False

Question 17

Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software.

True

False

Question 18

Hardware costs have been _______________ over time and software costs have been _______________ over time.

increasing; increasing

decreasing; decreasing

increasing; decreasing

decreasing; increasing

Question 19

_________________ software is an intermediary between computer hardware and _________________ software.

Systems; programming

Application; systems

Systems; application

Application; programming

Question 20

Hardware interacts directly with _______________ software.

Systems

Application

Programming

Documentation

Question 21

Hardware has become less complex while software has become more complex.

True

False

Question 22

Discrete speech-recognition software recognizes and interprets one word at a time.

True

False

Question 23

The set of computer programs used to manage hardware resources is called:

Personal application software.

Microsoft Office Suite.

General software.

Systems software.

Application software

Question 24

It is not necessary for computer programs to have documentation, because the code itself is easy to read and follow.

True

False

Question 25

Computer hardware is designed specifically for a particular application.

True

False

You will get a DOC (404KB) file

$ 20.00

$ 20.00

Buy Now

Discount has been applied.

Added to cart
or
Add to Cart
Adding ...