A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, ad spiders, and white-hat hackers
D) None of these
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these
Correct Answer
verified
Multiple Choice
A) Iris scan
B) Password
C) Fingerprint
D) Handwriting
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code
Correct Answer
verified
Multiple Choice
A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of these
Correct Answer
verified
Multiple Choice
A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of these
Correct Answer
verified
Multiple Choice
A) Privacy Act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
Correct Answer
verified
Multiple Choice
A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of these
Correct Answer
verified
Showing 21 - 40 of 225
Related Exams