Filters
Question type

Study Flashcards

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents teergrubing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.


A) The individual user
B) The company
C) The human resources department
D) The individual user's department

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following describes workplace MIS monitoring?


A) Tracking people's activities by such measures as number of keystrokes.
B) Tracking people's activities by such measures as error rate.
C) Tracking people's activities by such measures as number of transactions processed.
D) All of these.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?


A) An information privacy policy.
B) An email privacy policy.
C) An Internet use policy.
D) A workplace monitoring policy.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

A) True
B) False

Correct Answer

verifed

verified

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

A) True
B) False

Correct Answer

verifed

verified

What is a threat?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents physical security?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) Choosing to deny permission to incoming emails.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?


A) Cyberbulling
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents website name stealing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

What is an act or object that poses a danger to assets?


A) Cyberbullying
B) Threat
C) Click-fraud
D) Competitive click-fraud

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is competitive click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 95

Related Exams

Show Answer