Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) Content filtering, encryption, and firewalls
B) Calculating, locking, and firewalls
C) Content prohibiting, and cookies
D) None of the above
Correct Answer
verified
Multiple Choice
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
Correct Answer
verified
Multiple Choice
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Anti-spam policy
Correct Answer
verified
Multiple Choice
A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network
Correct Answer
verified
Multiple Choice
A) Personally identifiable information (PII)
B) Nonsensitive PII
C) Sensitive PII
D) Sock puppet marketing
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures.
Correct Answer
verified
Multiple Choice
A) Voiceprint
B) Face
C) Iris
D) All of the above
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.
Correct Answer
verified
Multiple Choice
A) Power outages
B) Tornados
C) A system upgrade
D) Network failure
Correct Answer
verified
Multiple Choice
A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization
Correct Answer
verified
Showing 261 - 280 of 354
Related Exams