Filters
Question type

Study Flashcards

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) ethics
B) intellectual property
C) standards of living
D) security

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

To find out your company's policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.


A) Internet use policy
B) social media policy
C) information use policy
D) employee monitoring policy

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or branD.

A) True
B) False

Correct Answer

verifed

verified

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

An ethical computer use policy contains ...

View Answer

Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

A) True
B) False

Correct Answer

verifed

verified

What is an anti-spamming approach whereby the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?


A) typosquatting
B) website name stealing
C) Internet censorship
D) nonrepudiation

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?


A) cyberbullying
B) cybervandalism
C) click-fraud
D) competitive click-fraud

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) ediscovery
B) Child Online Protection Act
C) digital rights management
D) pirated software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What decodes information?


A) digital certificate
B) encryption
C) decryption
D) cryptography

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.

A) True
B) False

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) crackers
B) black-hat hacker
C) hoaxes
D) cyberterrorists

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following defines teergrubing?


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) digital rights management
B) counterfeit software
C) privacy
D) pirated software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customers' names.This is a classic example of which of the following security breaches?


A) a social engineer
B) an insider
C) a spammer
D) a dumpster diver

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?


A) cyberbullying
B) fair information practices
C) click-fraud
D) bring your own device

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) identity crisis
B) identity theft
C) ediscovery
D) All of these are correct.

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) information systems policy
B) epolicies
C) technology applied policy
D) emastery

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) phishing
B) authentication
C) authorization
D) programming

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?


A) intellectual software
B) intellectual property
C) trademark property
D) ethical property

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 141 - 160 of 331

Related Exams

Show Answer