Correct Answer
verified
Multiple Choice
A) Safety
B) Ethical standard
C) Privacy
D) Proper
Correct Answer
verified
Multiple Choice
A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these offers an example of acting ethically.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus
Correct Answer
verified
Multiple Choice
A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
Correct Answer
verified
Multiple Choice
A) Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization
B) Statement discouraging sending junk email or spam to anyone who doesn't want to receive it
C) Statement informing users that the organization has no control over email once it has been transmitted outside the organization
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Splog
B) Adware
C) Spygloss
D) CPU buzzer
Correct Answer
verified
Multiple Choice
A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of these
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer.
B) A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites.
C) A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer.
D) All of these
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of these
Correct Answer
verified
Multiple Choice
A) User ramifications if the policy is violated
B) User responsibility for properly handling offensive material
C) User responsibility for protecting the company's good name
D) All of these
Correct Answer
verified
Multiple Choice
A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker
Correct Answer
verified
Multiple Choice
A) Content filtering, encryption, and firewalls
B) Calculating, locking, and firewalls
C) Content prohibiting and cookies
D) None of these
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Per hour, per day, and per week
B) Per employee, per computer, and per company
C) Per stock, per stockholder, and per investment capital
D) None of these
Correct Answer
verified
Showing 101 - 120 of 225
Related Exams