Filters
Question type

Study Flashcards

Which of the below should be included in a company email privacy policy?


A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization.
B) Discourages sending junk email or spam to anyone who doesn't want to receive it.
C) Informs users that the organization has no control over email once it has been transmitted outside the organization.
D) All of these.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employee's activities by measures such as keystrokes, error rate, and number of transaction processed?


A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents Internet censorship?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What refers to choosing to allow permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Cybervandalism is the electronic defacing of an existing website.

A) True
B) False

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

What is a program, when installed on a computer, records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

A

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

B

Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

A) True
B) False

Correct Answer

verifed

verified

Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

A) True
B) False

Correct Answer

verifed

verified

False

Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of these

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Web log
C) Adware
D) Hardware key logger

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 95

Related Exams

Show Answer