HRIS Privacy and Security MCQs

HRIS Privacy and Security MCQs

Answer these 20 HRIS Privacy and Security MCQs and see how sharp is your knowledge of HRIS Privacy and Security.
Scroll down and let's start!

1: Computer virus is a software program that _______ into another program and causes harm to a computer by altering data, erasing files, or other damage.

A.   Inserts a past of itself

B.   Inserts a DEL of itself

C.   Inserts a copy of itself

D.   All possible

2: Identification of mechanisms that can be used to protect data is known as _______ .

A.   Countermeasures

B.   Computer virus

C.   Workforce modeling

D.   None of these

3: Cyber-terrorism is a politically motivated use of technology to do severe harm or disruption in society

A.   True

B.   False

4: Define data accuracy .

A.   Politically motivated use of technology to do severe harm or disruption in society.

B.   The extent to which the value stored for an object is correct.

C.   Identification of mechanisms that can be used to protect data.

D.   None of these

5: Which technique attempts to make a computer, network, or service unavailable for legitimate users .

A.   Disgruntled employees

B.   Desired information goals

C.   Denial-of-service

D.   None of these

6: Desired information goals Ensuring that data are kept confidential, have not been manipulated, and are available to those who are authorized to access it.

A.   True

B.   False

7: Employees who have grievances against an employer and who believe that these grievances cannot be resolved is known as ______ .

A.   Disgruntled employees

B.   Desired information goals

C.   Denial-of-service

D.   None of these

8: GDPR stands for _____ .

A.   General Data Protection Regulation

B.   General Purpose Registers

C.   Grand Pacific Resorts (California)

D.   None of these

9: Hacker is an individual who accesses a computer or computer network unlawfully.

A.   True

B.   False

10: Information security is ensuring the confidentiality, integrity, and availability of information.

A.   True

B.   Fasle

11: An internationally agreed-upon set of standards governing information security management is known as ______ .

A.   ISO/IEC 27000

B.   McCumber Cube

C.   Malware

D.   None of these

12: Malware refers to malicious software whose primary purpose is to infiltrate a user’s machine without his/her knowledge.

A.   True

B.   False

13: A graphical model, or framework, of the architectural approach used when establishing or evaluating organizational security measures is known as ______ .

A.   McCumber Cube

B.   Malware

C.   Phishing

D.   None of these

14: Phishing is attempting to acquire, _______ by appearing to look like an authentic source with which the victim does business.

A.   Usernames

B.   Passwords

C.   Account information

D.   All of these

15: Ransomware involves locking and access to a system or files until a ransom is paid to the hacker.

A.   True

B.   False

16: Which type of virus hides in the operating system and causes viruses to appear as necessary files.

A.   Security breaches

B.   Rootkit

C.   Ransomware

D.   Spyware

17: Illegal access to private data, services, networks, or devices by getting around security protections is known as ______ .

A.   Security breaches

B.   Rootkit

C.   Ransomware

D.   Spyware

18: Spyware is a ______ on a computer that gathers information about a user’s activities on the Web and transmits it to third parties

A.   Hardware setup

B.   Software installed

C.   Both HD/SW

D.   None of these

19: The state in which data are currently residing. It can be in storage , in process , or in transmission is known as ______.

A.   State of information

B.   Spyware

C.   Stigmatized

D.   None of these

20: To regard an individual negatively or with disapproval is known as _____ .

A.   Trojan

B.   Worms

C.   Stigmatized

D.   None of these

21: A type of malware that hides inside email attachments or files and infects a user’s computer when it is opened and/or executed is known as _______ .

A.   Trojan

B.   Worms

C.   Both a & b

D.   None of these

22: To access employee (or other types) of data without ______ .

A.   Permission

B.   Authority

C.   Both a & b

D.   None of these

23: The disclosure of employee information to third parties without the permission of the employee is known as ______ .

A.   Unauthorized disclosure

B.   Unauthorized access

C.   Worms access

D.   None of these

24: According to the U.S. Fair Labor Standards Act workers can work under ______ in a week.

A.   45hours

B.   50hours

C.   40hours

D.   None of these

25: Worms is a stand-alone _______ that are meant to disrupt computer and network operations

A.   Hardware programs

B.   Software programs

C.   Both sw/HD

D.   None of these