Answer the following statement(s) true (T) or false (F)
1. Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
2. Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user.
3. The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
4. Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
5. Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
1. True
2. False
3. True
4. True
5. False
You might also like to view...
_________ include management, operational, and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities.
A. Security controls B. Risk appetite C. Risk controls D. None of the above
Which of the following is a way to sort data?
a. Alphabetically. b. In increasing numerical order. c. Based on an account number. d. All of the above.