A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) ediscovery
B) Child Online Protection Act
C) digital rights management
D) pirated software
Correct Answer
verified
Multiple Choice
A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) tangible protection such as alarms, guards, fireproof doors, fences, and vaults
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) choosing to deny permission to incoming emails
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) fiscal responsibility
B) damaged reputation
C) other expenses
D) regeneration quadrant
Correct Answer
verified
Multiple Choice
A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice or handwriting
Correct Answer
verified
Multiple Choice
A) ebusiness
B) eharmony
C) esoftware
D) epolicies
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) legal and confidential
B) legal and ethical
C) legal and technical
D) confidential and open
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) antivirus software
B) content filtering
C) encryption
D) firewalls
Correct Answer
verified
Multiple Choice
A) social engineering
B) social media
C) social viruses
D) social processes
Correct Answer
verified
Multiple Choice
A) the assurance that messages and data are available only to those who are authorized to view them
B) policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) the principles and standards that guide our behavior toward other people
Correct Answer
verified
Showing 1 - 20 of 331
Related Exams