Filters
Question type

Study Flashcards

What is spyware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following policies states that users agree to follow it in order to be given access to corporate email,information systems,and the Internet?


A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.

A) True
B) False

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) Spyware
B) Spam
C) Adware
D) None of the above

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

_________ is unsolicited email.

Correct Answer

verifed

verified

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

A) True
B) False

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

What is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The ___________ of downtime is split into four categories: financial performance,revenue,damaged reputations,and other expenses.

Correct Answer

verifed

verified

_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Correct Answer

verifed

verified

What is a program,when installed on a computer,records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information ethics

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called __________ computer use policy.

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or an information inquiry?


A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Identify theft is the forging of someone's identity for the purpose of __________.

Correct Answer

verifed

verified

What is the process that provides a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space?


A) Pharming
B) Authentication
C) Authorization
D) Programming

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data or information required to function,and grow effectively?


A) Information code
B) Information technology
C) Information management
D) Information governance

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following definitions represents Typosquatting?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Intellectual property is _________________ creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

Correct Answer

verifed

verified

Showing 181 - 200 of 344

Related Exams

Show Answer