Filters
Question type

Study Flashcards

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

Correct Answer

verifed

verified

Different organisations and countries have their own terms for these concerns. The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organisation for Economic Co-operation and Development (OECD) has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.

Correct Answer

verifed

verified

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD

Correct Answer

verifed

verified

Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

Correct Answer

verifed

verified

What outlines the corporate guidelines or principles governing employee online communications?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager

Correct Answer

verifed

verified

What is a mail bomb?


A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions

Correct Answer

verifed

verified

Which of the following describes workplace MIS monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these

Correct Answer

verifed

verified

Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.


A) the individual user
B) the company
C) the human resources department
D) the individual user's department

Correct Answer

verifed

verified

Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.

Correct Answer

verifed

verified

Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) Spyware
B) Spam
C) Adware
D) None of these

Correct Answer

verifed

verified

What occurs when a person chooses to deny permission to incoming emails?


A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

Correct Answer

verifed

verified

With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures such as keystrokes, error rate, and number of transactions processed?


A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring

Correct Answer

verifed

verified

What is a threat?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

Correct Answer

verifed

verified

Showing 81 - 98 of 98

Related Exams

Show Answer