Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the act of conforming, acquiescing, or yielding information
B) the ability to comply with software
C) the understanding of technology
D) the verbalization of information governance in a company's policies and procedures
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) reroutes requests for legitimate websites to false websites.
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization
Correct Answer
verified
Multiple Choice
A) acceptable use policy
B) internet use policy
C) ethical computer use policy
D) anti-hacker use policy
Correct Answer
verified
Multiple Choice
A) identification instruments
B) a form of digital cash
C) a data storage device
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) splogs
B) adware
C) spygloss
D) CPU buzzer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) sniffer
B) spyware
C) spoofware
D) splog
Correct Answer
verified
Multiple Choice
A) information code
B) information technology
C) information management
D) information governance
Correct Answer
verified
Multiple Choice
A) script kiddies
B) black-hat hacker
C) white-hat hacker
D) cracker
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) malicious code
B) hoaxes
C) spoofing
D) sniffer
Correct Answer
verified
Multiple Choice
A) social media monitoring
B) social media manager
C) social media policy
D) information privacy manager
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 201 - 220 of 331
Related Exams