A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
Multiple Choice
A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy
Correct Answer
verified
Multiple Choice
A) It is considered illegal
B) It is viewed as an invasion of privacy
C) It can be costly and intrusive
D) It requires constant monitoring and upgrading
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Correct Answer
verified
Multiple Choice
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Multiple Choice
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
Correct Answer
verified
Multiple Choice
A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above offers an example of acting ethically.
Correct Answer
verified
Multiple Choice
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
Multiple Choice
A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of the above
Correct Answer
verified
Showing 161 - 180 of 354
Related Exams