Filters
Question type

Study Flashcards

Which of the following means the right to be left alone when you want to be,to have control over your personal possessions,and not to be observed without your consent?


A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was,what ads were viewed and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Who are experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge?


A) Information spy
B) Hacker
C) Spyware
D) Adware

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) Technology first,customers second
B) Technology first,people second
C) Innovation first,technology second
D) People first,technology second

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

_____________ is a contractual stipulation to ensure that ebusiness participants do not deny their online actions.

Correct Answer

verifed

verified

Which of the following definitions represents Internet censorship?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of the above

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.

A) True
B) False

Correct Answer

verifed

verified

The unauthorized use,duplication,distribution,or sale of copyrighted software is called ____________ software.

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) Content filtering,encryption,and firewalls
B) Calculating,locking,and firewalls
C) Content prohibiting,and cookies
D) None of the above

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Information compliance is the act of conforming,acquiescing,or yielding information.

A) True
B) False

Correct Answer

verifed

verified

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

Correct Answer

verifed

verified

Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

Correct Answer

verifed

verified

A __________ is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor

Correct Answer

verifed

verified

The _________ act restricts what information the federal government can collect.

Correct Answer

verifed

verified

_________ programs are viruses that open a way into the network for future attacks.

Correct Answer

verifed

verified

Showing 21 - 40 of 344

Related Exams

Show Answer