Filters
Question type

Study Flashcards

Which of the below is a common Internet monitoring technology?


A) Key logger
B) Hardware key logger
C) Cookie
D) All of these

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

If an organization implemented only one policy, which one would it want to implement?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?


A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the below would you find in a typical Internet use policy?


A) User ramifications if the policy is violated.
B) User responsibility for properly handling offensive material.
C) User responsibility for protecting the company's good name.
D) All of these.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Cybervandalism is the electronic defacing of an existing website.

A) True
B) False

Correct Answer

verifed

verified

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

A) True
B) False

Correct Answer

verifed

verified

Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is a program that, when installed on a computer, records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following definitions represents typosquatting?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

A) True
B) False

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?


A) An information privacy policy.
B) An email privacy policy.
C) An Internet use policy.
D) A workplace monitoring policy.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Which of the below would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law.
B) Not posting commercial messages to groups where the employee has received user consent.
C) Not performing any repudiation.
D) Not attempting to break the security of any computer network.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 98

Related Exams

Show Answer