- Description
CIS 207T Week 5 WileyPLUS Weekly Exam
For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.
Complete this graded exam by doing the following:
1. Click the link to begin the graded exam.
2. Read the exam policies carefully.
3. Click the Next button to begin the exam.
4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.
Question 1
The law basically does not support an employer’s right to read electronic mail and other electronic documents.
True
False
Question 2
Privacy regulations are basically the same from country to country around the world.
True
False
Question 3
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
Profiling
Information privacy
A digital dossier
Privacy
Question 4
______________ is an electronic profile of you and your habits.
Privacy
Information privacy
Profiling
A digital dossier
Question 5
______________ is the process of forming a digital dossier.
Privacy
Profiling
Dossiering
Information privacy
Question 6
Which of the following is NOT an example of a profiler?
Amazon
ChoicePoint
LexisNexis
Acxiom
Question 7
The right of privacy ___________ absolute.
cannot be
can be
is not
is
Question 8
Risk management identifies, controls, and minimizes the impact of threats to the organization’s information security.
True
False
Question 9
Which if the following is not a common risk mitigation strategy?
Risk analysis.
Risk limitation.
Risk acceptance.
Risk transference.
Question 10
Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?
It is difficult, if not impossible, for organization to provide perfect security for their data.
China is the leading hacking group that encourages similar behavior from other countries.
It appears that it is impossible to secure the Internet.
There is a growing danger that countries are engaging in economic cyberwarfare among themselves.
Question 11
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Espionage
Information extortion
Competitive intelligence
Intellectual property
Question 12
Phishing is an example of __________.
Copyright infringement
Espionage
Software attack
Sabotage
Question 13
You start browsing your favorite home improvement company’s website and notice someone has changed all the logos to their main competitor’s logos. This is an example of ___________.
Espionage
Identity theft
Information extortion
Sabotage
Question 14
Application software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs.
True
False
Question 15
Software consists of the instructions given to computer hardware.
True
False
Question 16
Application software is a set of computer instructions that provide specific functionality for a user.
True
False
Question 17
Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software.
True
False
Question 18
Hardware costs have been _______________ over time and software costs have been _______________ over time.
increasing; increasing
decreasing; decreasing
increasing; decreasing
decreasing; increasing
Question 19
_________________ software is an intermediary between computer hardware and _________________ software.
Systems; programming
Application; systems
Systems; application
Application; programming
Question 20
Hardware interacts directly with _______________ software.
Systems
Application
Programming
Documentation
Question 21
Hardware has become less complex while software has become more complex.
True
False
Question 22
Discrete speech-recognition software recognizes and interprets one word at a time.
True
False
Question 23
The set of computer programs used to manage hardware resources is called:
Personal application software.
Microsoft Office Suite.
General software.
Systems software.
Application software
Question 24
It is not necessary for computer programs to have documentation, because the code itself is easy to read and follow.
True
False
Question 25
Computer hardware is designed specifically for a particular application.
True
False