Filters
Question type

Study Flashcards

Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

Which of the below should be included in a company email privacy policy?


A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization.
B) Discourages sending junk email or spam to anyone who doesn't want to receive it.
C) Informs users that the organization has no control over email once it has been transmitted outside the organization.
D) All of these.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?


A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

A) True
B) False

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?


A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

A user can opt in to receive emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents teergrubing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Information vandalism
C) Cookie
D) BYOD

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Anti-spam policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not considered an epolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

(1) An ethical computer use policy conta...

View Answer

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Repudiation

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 98

Related Exams

Show Answer