A) Internet use policy
B) social media policy
C) information use policy
D) employee monitoring policy
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Threat
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy
Correct Answer
verified
Multiple Choice
A) Key logger
B) Stealthware
C) Clickstream
D) Web log
Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) informed, collaborate
B) consent, informed
C) informed, consent
D) consent, information
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
Multiple Choice
A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.
Correct Answer
verified
Multiple Choice
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the choices are correct
Correct Answer
verified
Showing 1 - 20 of 98
Related Exams