Correct Answer
verified
Multiple Choice
A) Key logger
B) Stealthware
C) Clickstream
D) Web log
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Downtime
B) MIS down
C) Direct data loss
D) Downtown
Correct Answer
verified
Multiple Choice
A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution
Correct Answer
verified
Multiple Choice
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
Correct Answer
verified
Multiple Choice
A) Key logger software
B) Spyware
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The act of conforming,acquiescing,or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
Correct Answer
verified
Multiple Choice
A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of these choices
Correct Answer
verified
Showing 201 - 220 of 333
Related Exams