Filters
Question type

Study Flashcards

What is click-fraud?


A) The electronic defacing of an existing website
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) An act or object that poses a danger to assets

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Applications allowed to be placed on the corporate network,like IM software,and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?


A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of these choices

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What are biometrics?


A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Standards of living
D) Security

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents Internet censorship?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following changes its form as it propagates?


A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is a threat?


A) The electronic defacing of an existing website
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) An act or object that poses a danger to assets

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these choices

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is the unauthorized use,duplication,distribution,or sale of copyrighted software?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

In relation to privacy,which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.

A) True
B) False

Correct Answer

verifed

verified

Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.

A) True
B) False

Correct Answer

verifed

verified

What is dumpster diving?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker that looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Backdoor programs open a way into the network for future attacks.

A) True
B) False

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is pirated software?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?


A) Cyberbulling
B) Fair information practices
C) Click-fraud
D) Bring your own device

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

As the president of a local trade company,Kristin is faced with leadership,ethical,and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions,uses,value,and distribution ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Showing 121 - 140 of 333

Related Exams

Show Answer