A) email privacy policy
B) spam policy and procedures
C) anti-spam policy
D) Internet user policy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) information secrecy
B) phishing
C) phishing expedition
D) spear phishing
Correct Answer
verified
Multiple Choice
A) firewall
B) certificate authority
C) online certificate
D) digital certificate
Correct Answer
verified
Multiple Choice
A) user ramifications if the policy is violated
B) user responsibility for properly handling offensive material
C) user responsibility for protecting the company's good name
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) choosing to allow permission to incoming emails
D) choosing to deny permission to incoming emails
Correct Answer
verified
Multiple Choice
A) black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of these are correct.
Correct Answer
verified
Multiple Choice
A) legal behavior and ethical behavior.
B) illegal behavior and ethical behavior.
C) legal behavior and unethical behavior.
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) opt out
B) opt in
C) BYOD
D) nonrepudiation
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Multiple Choice
A) typosquatting
B) website name stealing
C) internet censorship
D) teergrubing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Correct Answer
verified
True/False
Correct Answer
verified
Showing 41 - 60 of 331
Related Exams