A) User ramifications if the policy is violated
B) User responsibility for properly handling offensive material
C) User responsibility for protecting the company's good name
D) All of these choices
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Multiple Choice
A) Voiceprint
B) Face
C) Iris
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of these choices
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer
Correct Answer
verified
Multiple Choice
A) The act of conforming,acquiescing,or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) Technology first,customers second
B) Technology first,people second
C) Innovation first,technology second
D) People first,technology second
Correct Answer
verified
Multiple Choice
A) The act of conforming,acquiescing,or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Virus
C) Hacker
D) Worm
Correct Answer
verified
Multiple Choice
A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
Multiple Choice
A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 21 - 40 of 333
Related Exams