Filters
Question type

Study Flashcards

If an organization implemented only one policy, which one would it want to implement?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

Correct Answer

verifed

verified

Cyberbullying is an act or object that poses a danger to assets.

Correct Answer

verifed

verified

Teergrubing is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

Correct Answer

verifed

verified

What occurs when a person chooses to deny permission to incoming emails?


A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing

Correct Answer

verifed

verified

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Repudiation

Correct Answer

verifed

verified

Different organizations and countries have their own terms for fair information practices.Which of the following is correct?


A) The United Kingdom terms it "Data Protection."
B) The European Union terms it "Data Protection."
C) The United Kingdom terms it "Personal Data Privacy."
D) The United States terms it "Personal Data Privacy."

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) Spyware
B) Spam
C) Adware
D) None of these

Correct Answer

verifed

verified

BYOD policies offer four basic options, including unlimited access for personal devices, access only to nonsensitive systems and data, access, but with IT control over personal devices, apps, and stored data, access, but preventing local storage of data on personal devices.

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

Correct Answer

verifed

verified

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

Correct Answer

verifed

verified

What is a mail bomb?


A) The sending of a massive amount of email to a specific person or system resulting in filling up the recipient's disk space.
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions.
C) The sending of a few emails to a specific person or system resulting in filling up the recipient's disk space.
D) A contractual stipulation to ensure that ebusiness participants deny their online actions.

Correct Answer

verifed

verified

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to deny permission to incoming emails.

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery

Correct Answer

verifed

verified

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

Correct Answer

verifed

verified

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

(1) An ethical computer use policy conta...

View Answer

A cyberbully is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

Correct Answer

verifed

verified

A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

Correct Answer

verifed

verified

Which of the following is a common Internet monitoring technology?


A) Key logger
B) Hardware key logger
C) Cookie
D) All of these

Correct Answer

verifed

verified

Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

Correct Answer

verifed

verified

Showing 21 - 40 of 95

Related Exams

Show Answer