Filters
Question type

Study Flashcards

Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.

A) True
B) False

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?


A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of the above

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Information security ___________ identify the rules required to maintain information security,such as requiring users to log off before leaving for lunch or meetings,never sharing passwords with anyone,and changing passwords every thirty days.

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of the above

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

A(n)_________ is software written with malicious intent to cause annoyance or damage.

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the below is a common Internet monitoring technology?


A) Key logger
B) Hardware key logger
C) Cookie
D) All of the above

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

Correct Answer

verifed

verified

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

A) True
B) False

Correct Answer

verifed

verified

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

______________ property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

Correct Answer

verifed

verified

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Standards of living
D) Security

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Cybervandalism
C) Cookie
D) All of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?


A) Information security
B) Physical security
C) Drive-by hacking
D) Adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following definitions represents opt-out?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) Choosing to deny permission to incoming emails.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is the difference between pirated and counterfeit software?


A) Counterfeit is fake technology products,where pirated is invisible technological cameras placed online
B) Pirated is the unauthorized use,duplication,distribution,or sale of copyrighted software,where counterfeit is software that is manufactured to look like the real thing and sold as such
C) Counterfeit is the unauthorized use,duplication,distribution,or sale of copyrighted software,where pirated is software that is manufactured to look like the real thing and sold as such
D) Pirated is stolen software used to hack into a company's classified material,where counterfeit is a fake version of firewall software

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Trust between companies,customers,partners,and suppliers are the support structure of which of the following?


A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 161 - 180 of 344

Related Exams

Show Answer