A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) An internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) It is considered illegal
B) It is viewed as an invasion of privacy
C) It can be costly and intrusive
D) It requires constant monitoring and upgrading
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network
Correct Answer
verified
Multiple Choice
A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
Correct Answer
verified
Multiple Choice
A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
Correct Answer
verified
Multiple Choice
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
Correct Answer
verified
Showing 261 - 280 of 344
Related Exams