Attachments: No Attachments
CIS 207T Week 5 WileyPLUS Weekly Exam
For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.
Complete this graded exam by doing the following:
1. Click the link to begin the graded exam.
2. Read the exam policies carefully.
3. Click the Next button to begin the exam.
4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.
The law basically does not support an employer’s right to read electronic mail and other electronic documents.
Privacy regulations are basically the same from country to country around the world.
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
A digital dossier
______________ is an electronic profile of you and your habits.
A digital dossier
______________ is the process of forming a digital dossier.
Which of the following is NOT an example of a profiler?
The right of privacy ___________ absolute.
Risk management identifies, controls, and minimizes the impact of threats to the organization’s information security.
Which if the following is not a common risk mitigation strategy?
Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014?
It is difficult, if not impossible, for organization to provide perfect security for their data.
China is the leading hacking group that encourages similar behavior from other countries.
It appears that it is impossible to secure the Internet.
There is a growing danger that countries are engaging in economic cyberwarfare among themselves.
___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.
Phishing is an example of __________.
You start browsing your favorite home improvement company’s website and notice someone has changed all the logos to their main competitor’s logos. This is an example of ___________.
Application software is a set of instructions that serves primarily as an intermediary between computer hardware and application programs.
Software consists of the instructions given to computer hardware.
Application software is a set of computer instructions that provide specific functionality for a user.
Personal application software consists of widely used packages such as word processing, spreadsheet, communications, and graphics software.
Hardware costs have been _______________ over time and software costs have been _______________ over time.
_________________ software is an intermediary between computer hardware and _________________ software.
Hardware interacts directly with _______________ software.
Hardware has become less complex while software has become more complex.
Discrete speech-recognition software recognizes and interprets one word at a time.
The set of computer programs used to manage hardware resources is called:
Personal application software.
Microsoft Office Suite.
It is not necessary for computer programs to have documentation, because the code itself is easy to read and follow.
Computer hardware is designed specifically for a particular application.