Correct Answer
verified
Multiple Choice
A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Information management
B) Information compliance
C) Information governance
D) Information ethics
Correct Answer
verified
Multiple Choice
A) Legal;confidential
B) Legal;ethical
C) Legal;technical
D) Confidential;open
Correct Answer
verified
Multiple Choice
A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above
Correct Answer
verified
Multiple Choice
A) Information governance
B) Information privacy policy
C) Ethical computer use policy
D) Acceptable use policy
Correct Answer
verified
Multiple Choice
A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of the above
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) All of the above
Correct Answer
verified
Showing 121 - 140 of 342
Related Exams