Filters
Question type

Study Flashcards

What is click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

___________is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

Correct Answer

verifed

verified

Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.

Correct Answer

verifed

verified

Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal
B) It is viewed as an invasion of privacy
C) It can be costly and intrusive
D) It requires constant monitoring and upgrading

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

An email ____________ policy details the extent to which email messages may be read by others.

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?


A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Decrypt information is to decode it and is the opposite of encrypt.

A) True
B) False

Correct Answer

verifed

verified

Which of the below would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is information secrecy?


A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense;the first is __________,and the second is technology.

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___ and ________.


A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content,such as email,to prevent the accidental or malicious transmission of unauthorized information?


A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes workplace MIS monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?


A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Showing 261 - 280 of 344

Related Exams

Show Answer