A) cyberbullying
B) threat
C) click-fraud
D) competitive click-fraud
Correct Answer
verified
Multiple Choice
A) contentment
B) ethical standard
C) confidentiality
D) firewall security
Correct Answer
verified
Multiple Choice
A) encryption
B) content filtering
C) firewalls
D) antivirus software
Correct Answer
verified
Multiple Choice
A) an information privacy policy
B) an email privacy policy
C) an Internet use policy
D) a workplace monitoring policy
Correct Answer
verified
Multiple Choice
A) virus
B) white-hat hackers
C) dumpster diving
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) pharming
B) phishing
C) phishing expedition
D) spear phishing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Correct Answer
verified
Multiple Choice
A) information privacy policy
B) workplace monitoring policy
C) acceptable use policy
D) downtime monitoring policy
Correct Answer
verified
Multiple Choice
A) dumpster texting
B) dumpster diving
C) trash retrieval
D) pretexting
Correct Answer
verified
Multiple Choice
A) typosquatting
B) website name stealing
C) Internet censorship
D) teergrubing
Correct Answer
verified
Multiple Choice
A) an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) spyware
B) web log
C) adware
D) hardware key logger
Correct Answer
verified
Multiple Choice
A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Showing 101 - 120 of 331
Related Exams