A) Iris scan
B) Password
C) Fingerprint
D) Handwriting
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the above
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Individuals copy,use,and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above offers an example of acting ethically
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs
Correct Answer
verified
Multiple Choice
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Multiple Choice
A) Information governance
B) Information privacy policy
C) Ethical computer use policy
D) Acceptable use policy
Correct Answer
verified
Multiple Choice
A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Threat
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card
Correct Answer
verified
Showing 61 - 80 of 344
Related Exams