A) The electronic defacing of an existing website
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) An act or object that poses a danger to assets
Correct Answer
verified
Multiple Choice
A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of these choices
Correct Answer
verified
Multiple Choice
A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Standards of living
D) Security
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) An act or object that poses a danger to assets
Correct Answer
verified
Multiple Choice
A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker that looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy
Correct Answer
verified
Multiple Choice
A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Fair information practices
C) Click-fraud
D) Bring your own device
Correct Answer
verified
Multiple Choice
A) Information codes
B) Information management
C) Information deployment
D) Information security
Correct Answer
verified
Showing 121 - 140 of 333
Related Exams