Filters
Question type

Study Flashcards

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy.
B) Notice and disclosure.
C) Choice and quality.
D) None of these.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following would you find in a typical Internet use policy?


A) User ramifications if the policy is violated.
B) User responsibility for properly handling offensive material.
C) User responsibility for protecting the company's good name.
D) All of these.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What refers to denying permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following definitions represents opt-in?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?


A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law.
B) Not posting commercial messages to groups where the employee has received user consent.
C) Not performing any nonrepudiation.
D) Not attempting to break the security of any computer network.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?


A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?


A) Key logger
B) Hardware key logger
C) Cookie
D) Adware

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is cybervandalism?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?


A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following definitions represents opt-out?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Showing 61 - 80 of 95

Related Exams

Show Answer