A) Adoption and implementation of an anti-spam policy.
B) Notice and disclosure.
C) Choice and quality.
D) None of these.
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
Correct Answer
verified
Multiple Choice
A) User ramifications if the policy is violated.
B) User responsibility for properly handling offensive material.
C) User responsibility for protecting the company's good name.
D) All of these.
Correct Answer
verified
Multiple Choice
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
Correct Answer
verified
Multiple Choice
A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD
Correct Answer
verified
Multiple Choice
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
Correct Answer
verified
Multiple Choice
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.
Correct Answer
verified
Multiple Choice
A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these
Correct Answer
verified
Multiple Choice
A) Not using the service as part of violating any law.
B) Not posting commercial messages to groups where the employee has received user consent.
C) Not performing any nonrepudiation.
D) Not attempting to break the security of any computer network.
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.
Correct Answer
verified
Showing 61 - 80 of 95
Related Exams