Information Security & Protection Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. What does the acronym DBA stand for in the context of information systems?

Question 2 2. What is a firewall?

Question 3 3. Coca-Cola uses a special recipe to create the bottled product. The recipe is owned by the corporation. KooKoo-Kola finds and uses the recipe without Coca-Cola's permission. This is an example of _____.

Question 4 4. As part of implementing applications security, which of the following would a company have to do?

Question 5 5. Jan is a music teacher at an elementary school. She writes a play for her students to perform. The next year, she learns that another elementary school copied and is performing the same play. Jan never registered or published the play. Which of the following is true?

Page 2

Question 6 6. Which of the following is NOT automatically copyrighted?

Question 7 7. What is identity theft?

Question 8 8. What is security management?

Question 9 9. Which of the following is NOT protected by intellectual property laws?

Question 10 10. What does it mean when you hear that a company suffered a security breach?

Page 3

Question 11 11. As part of implementing systems security, which of the following would a company need to do?

Question 12 12. Soda-Pop asks Lady GiGi if they can use her song in a television commercial and she agrees. Soda Pop will pay Lady GiGi. This is called:

Question 13 13. Alex invents a small water faucet that dispenses boiling water. He applies for and obtains a patent. Andrew then uses Alex's design without Alex's permission to manufacture and distribute the faucet. This is an example of _____.

Question 14 14. Intellectual property is like other forms of property, EXCEPT that _____.

Question 15 15. Anne's grandfather wrote a very famous novel many years ago and she owned the copyrights. She recently discovered that the copyrights expired and people can use the novel as they wish. This is called:

Page 4

Question 16 16. Which of the following is an example of phishing?

Question 17 17. What is data encryption?

Question 18 18. Taco Bell registered their logo that uses a purple bell so that no competitors would use a similar logo. This is an example of _____.

Question 19 19. Which of the following is NOT an example of a cyber crime?

Question 20 20. What is a computer virus?

Page 5

Question 21 21. How does a computer virus work?

Question 22 22. Which of the following statements about cyberstalking is TRUE?

Question 23 23. A company suffered a security breach. What is the very first thing the company needs to do?

Question 24 24. Copyright infringement is a:

Question 25 25. Which of the following tasks is a typical role of a database administrator?

Information Security & Protection Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

GACE Business Education (542): Practice & Study Guide  /  Business Courses
Support