Filters
Question type

Study Flashcards

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

What is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Information vandalism
C) Cookie
D) BYOD

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

A) True
B) False

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is not considered an epolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ____________ policy.


A) Internet use
B) Social media
C) Information use
D) Employee monitoring

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.


A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) Consent, information

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following definitions represents typosquatting?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following is one of the four basic options included in a bring your own device policy?


A) Unlimited access for personal devices.
B) Access only to nonsensitive systems and data.
C) Access, but preventing local storage of data on personal devices.
D) All of these.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

A user can opt in to receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Different organizations and countries have their own terms for these concerns.The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy", the Organization for Economic Co-operation and Development (OECD) has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.

A) True
B) False

Correct Answer

verifed

verified

A user can opt in to receive emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 81 - 95 of 95

Related Exams

Show Answer