Filters
Question type

Study Flashcards

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?


A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following definitions represents teergrubing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal
B) It is viewed as an invasion of privacy
C) It can be costly and intrusive
D) It requires constant monitoring and upgrading

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

A) True
B) False

Correct Answer

verifed

verified

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not considered an epolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.

A) True
B) False

Correct Answer

verifed

verified

What is the Child Online Protection Act?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above offers an example of acting ethically.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What refers to choosing to allow permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Decrypt information is to decode it and is the opposite of encrypt.

A) True
B) False

Correct Answer

verifed

verified

What is a mail bomb?


A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the below should be included in a company email privacy policy?


A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 161 - 180 of 354

Related Exams

Show Answer