Filters
Question type

Study Flashcards

A user can opt out to receive emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

What refers to choosing to allow permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

What is click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following definitions represents opt-out?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Cyberbullying is an act or object that poses a danger to assets.

A) True
B) False

Correct Answer

verifed

verified

What is cybervandalism?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

A) True
B) False

Correct Answer

verifed

verified

BYOD policies offer four basic options, including unlimited access for personal devices; access only to nonsensitive systems and data; access, but with IT control over personal devices, apps, and stored data; access, but preventing local storage of data on personal devices.

A) True
B) False

Correct Answer

verifed

verified

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following definitions represents Internet censorship?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

What refers to denying permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is one of the four basic options included in a bring your own device policy?


A) Unlimited access for personal devices.
B) Access only to nonsensitive systems and data.
C) Access, but preventing local storage of data on personal devices.
D) All of these.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of these

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is competitive click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Which of the following definitions represents physical security?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) Choosing to deny permission to incoming emails.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 98

Related Exams

Show Answer