A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) digital certificate
B) encryption
C) decrypt
D) cryptography
Correct Answer
verified
Multiple Choice
A) information ethics policy
B) information security policies
C) information technology plan
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) opt out
B) opt in
C) BYOD
D) nonrepudiation
Correct Answer
verified
Multiple Choice
A) switch the order of characters
B) replace characters with other characters
C) insert or remove characters
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) information bullying
B) cybervandalism
C) cookie
D) BYOD
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) packet tampering, worms, cakes, and trojan viruses
B) polymorphic, sniffer, splogs, and denial-of-service viruses
C) backdoor program, worm, Trojan-horse viruses
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.
Correct Answer
verified
Multiple Choice
A) interconnected data software (IDS)
B) intrusion detection software (IDS)
C) security Information system (SIS)
D) internet detection scanner (IDS)
Correct Answer
verified
Multiple Choice
A) privacy
B) confidentiality
C) intellectual property
D) copyright
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Correct Answer
verified
Multiple Choice
A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets
Correct Answer
verified
Showing 181 - 200 of 331
Related Exams