A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread,where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person,where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread,where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy
Correct Answer
verified
Multiple Choice
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Token
B) Password
C) Smart card
D) Biometrics
Correct Answer
verified
Showing 61 - 80 of 333
Related Exams