Filters
Question type

Study Flashcards

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ________ policy.


A) Internet use policy
B) social media policy
C) information use policy
D) employee monitoring policy

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is an act or object that poses a danger to assets?


A) Cyberbullying
B) Threat
C) Click-fraud
D) Competitive click-fraud

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?


A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy

E) All of the above
F) None of the above

Correct Answer

verifed

verified

A

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?


A) Key logger
B) Hardware key logger
C) Cookie
D) Adware

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.


A) informed, collaborate
B) consent, informed
C) informed, consent
D) consent, information

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

A) True
B) False

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following definitions represents website name stealing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

B

Different organizations and countries have their own terms for fair information practices. Which of the following is correct?


A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A user can opt in of receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

False

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Web log
C) Adware
D) Hardware key logger

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following definitions represents opt-in?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the choices are correct

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 98

Related Exams

Show Answer