A) Internet use policy
B) Social media policy
C) Information use policy
D) Employee monitoring policy
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
Multiple Choice
A) Token
B) Password
C) Smart card
D) Biometrics
Correct Answer
verified
Multiple Choice
A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of the above
Correct Answer
verified
Multiple Choice
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
Correct Answer
verified
Multiple Choice
A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs
Correct Answer
verified
Multiple Choice
A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage
Correct Answer
verified
Multiple Choice
A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Phishing is not illegal, pharming is illegal
B) Phishing is the right of the company, where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Showing 21 - 40 of 354
Related Exams