Filters
Question type

Study Flashcards

What is an act or object that poses a danger to assets?


A) Cyberbullying
B) Threat
C) Click-fraud
D) Competitive click-fraud

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A smart card is a device, the size of a credit card that contains embedded technology that stores information and small amounts of software, and can act as ________.


A) Identification instruments
B) A form of digital cash
C) A data storage device
D) All of the above

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is competitive click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Different organizations and countries have their own terms for these concerns. The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organization for Economic Co-operation and Development (OECD)has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.

A) True
B) False

Correct Answer

verifed

verified

Trust between companies, customers, partners, and suppliers are the support structure of which of the following?


A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

Cyberbullying is an act or object that poses a danger to assets.

A) True
B) False

Correct Answer

verifed

verified

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function, and grow effectively?


A) Information code
B) Information technology
C) Information management
D) Information governance

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following definitions represents Website name stealing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the below represents the definition of information secrecy?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

A) True
B) False

Correct Answer

verifed

verified

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is a common Internet monitoring technology?


A) Key logger
B) Hardware key logger
C) Cookie
D) All of the above

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What passed to protect minors from accessing inappropriate material on the Internet?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Showing 201 - 220 of 354

Related Exams

Show Answer