A) Downtime
B) MIS down
C) Direct data loss
D) Downtown
Correct Answer
verified
Multiple Choice
A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists
Correct Answer
verified
Multiple Choice
A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) An internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
Correct Answer
verified
Multiple Choice
A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker
Correct Answer
verified
Multiple Choice
A) Internet use
B) Social media
C) Information use
D) Employee monitoring
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
Correct Answer
verified
Multiple Choice
A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Showing 221 - 240 of 342
Related Exams