A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees
Correct Answer
verified
Multiple Choice
A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the answers are correct
Correct Answer
verified
Multiple Choice
A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the answers is correct
Correct Answer
verified
Multiple Choice
A) An insider
B) Dumpster diving
C) Social engineering
D) Phishing
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Interconnected data software (IDS)
B) Intrusion-detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Identity crisis
B) Identity theft
C) e-Discovery
D) All of the answers are correct
Correct Answer
verified
Multiple Choice
A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 60 days
D) All of the answers are correct
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread; whereas,a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person; whereas,a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread; whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the answers are correct
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Personal information on the internet can have unexpected spectators.
B) Personal information is information that identifies,or could be used to identify,an individual.
C) The obligation of an organisation to balance the commercial use of personal information with ensuring such use is ethical is one affecting many businesses today.
D) All of the answers are correct
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information governance
D) Information ethics
Correct Answer
verified
Showing 41 - 60 of 80
Related Exams