Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Any data that could potentially identify a specific individual.
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) .Any data that could potentially identify a specific individual
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Standards of living
D) Security
Correct Answer
verified
Multiple Choice
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 221 - 240 of 354
Related Exams