Correct Answer
verified
Multiple Choice
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
Correct Answer
verified
Multiple Choice
A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate
Correct Answer
verified
Multiple Choice
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of the above
Correct Answer
verified
Multiple Choice
A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
Multiple Choice
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
Correct Answer
verified
Multiple Choice
A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
Multiple Choice
A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 81 - 100 of 344
Related Exams