Filters
Question type

Study Flashcards

With so much information and moving parts within a company,technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employee's activities by measures as keystrokes,error rate,and number of transaction processed?


A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these choices

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

BYOD policies offer four basic options,including unlimited access for personal devices,access only to nonsensitive systems and data,access,but with IT control over personal devices,apps,and stored data,access,but preventing local storage of data on personal devices.

A) True
B) False

Correct Answer

verifed

verified

Which of the following means the right to be left alone when you want to be,to have control over your personal possessions,and not to be observed without your consent?


A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents Website name stealing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is phishing?


A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

Different organizations and countries have their own terms for these concerns.The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organization for Economic Co-operation and Development (OECD)has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.

A) True
B) False

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Cyberbullying is an act or object that poses a danger to assets.

A) True
B) False

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What outlines the corporate guidelines or principles governing employee online communications?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 321 - 333 of 333

Related Exams

Show Answer