A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of the above
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread,where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person,where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread,where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware
Correct Answer
verified
Multiple Choice
A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of the above
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Virus
C) Hacker
D) Worm
Correct Answer
verified
Multiple Choice
A) Splog
B) Adware
C) Spygloss
D) CPU buzzer
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Black-hat,cracker,cyberterrorist,hactivist,script kiddies,and white-hat hackers
B) Black-top,cookie,script kids,environment,Web 3.0,and white-top hackers
C) Black-hat,script kiddies,script bats,spider crawlers,Ad spiders,and white-hat hackers
D) None of the above
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 41 - 60 of 342
Related Exams