Filters
Question type

Study Flashcards

What is cybervandalism?


A) The electronic defacing of an existing website
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) An act or object that poses a danger to assets

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?


A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how,when,and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

What is drive-by hacking?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company.Her boss,Mike Jones,is responsible for developing a new software game for the Wii.After completion of the project Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.


A) counterfeit software
B) pirated software
C) ethical software
D) governance software

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

Trust between companies,customers,partners,and suppliers are the support structure of which of the following?


A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

E) All of the above
F) None of the above

Correct Answer

verifed

verified

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

A) True
B) False

Correct Answer

verifed

verified

Phishing reroutes requests for legitimate websites to false websites.

A) True
B) False

Correct Answer

verifed

verified

Different organizations and countries have their own terms for fair information practices.Which of the following is correct?


A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is an act or object that poses a danger to assets?


A) Cyberbulling
B) Threat
C) Click-fraud
D) Competitive click-fraud

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following definitions represents opt-out?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data or information required to function,and grow effectively?


A) Information code
B) Information technology
C) Information management
D) Information governance

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following policies states that users agree to follow it in order to be given access to corporate email,information systems,and the Internet?


A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A DDoS stands for one of the common forms of viruses,that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?


A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Showing 301 - 320 of 333

Related Exams

Show Answer