A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Unlimited access for personal devices
B) Access only to nonsensitive systems and data
C) Access, but preventing local storage of data on personal devices
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Personally identifiable information (PII)
B) Nonsensitive PII
C) Sensitive PII
D) Sock puppet marketing
Correct Answer
verified
Multiple Choice
A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of the above
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware
Correct Answer
verified
Multiple Choice
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
Correct Answer
verified
Multiple Choice
A) Spyware
B) Spam
C) Adware
D) None of the above
Correct Answer
verified
Multiple Choice
A) Any data that could potentially identify a specific individual.
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Any data that could potentially identify a specific individual.
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.
Correct Answer
verified
Multiple Choice
A) Information spy
B) Hacker
C) Spyware
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
Correct Answer
verified
Multiple Choice
A) Smart card
B) Token
C) Biometrics
D) Content filtering
Correct Answer
verified
Multiple Choice
A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of the above
Correct Answer
verified
Multiple Choice
A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
Showing 141 - 160 of 354
Related Exams