Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Correct Answer
verified
Multiple Choice
A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
Correct Answer
verified
Multiple Choice
A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
Correct Answer
verified
Multiple Choice
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the individual user
B) the company
C) the human resources department
D) the individual user's department
Correct Answer
verified
Multiple Choice
A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy
Correct Answer
verified
Multiple Choice
A) Spyware
B) Spam
C) Adware
D) None of these
Correct Answer
verified
Multiple Choice
A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
Showing 81 - 98 of 98
Related Exams