A) Digital certificate
B) Encryptography
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate
Correct Answer
verified
Multiple Choice
A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Downtime
B) MIS down
C) Direct data loss
D) Downtown
Correct Answer
verified
Multiple Choice
A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy
Correct Answer
verified
Multiple Choice
A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Cybervandalism
C) Cookie
D) All of the above
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus
Correct Answer
verified
Showing 101 - 120 of 344
Related Exams