A) acceptable use policy
B) email privacy policy
C) internet use policy
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cyberbullying
B) fair information practices
C) click-fraud
D) bring your own device
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) email privacy policy
B) email confidential policy
C) anti-spam policy
D) spam policy
Correct Answer
verified
Multiple Choice
A) information spy
B) hacker
C) spyware
D) adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) safety
B) ethical standard
C) privacy
D) confidentiality
Correct Answer
verified
Multiple Choice
A) compliance
B) noncommittal
C) nonrepudiation
D) erepudiation
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) biometrics
Correct Answer
verified
Multiple Choice
A) confidentiality
B) digital information
C) privacy policies
D) information ethics
Correct Answer
verified
Multiple Choice
A) elevation of privilege
B) virus
C) hacker
D) worm
Correct Answer
verified
Multiple Choice
A) ethical information
B) information technology
C) information policies
D) information ethics
Correct Answer
verified
Multiple Choice
A) requiring computer users to log off before leaving for lunch
B) never sharing user or password information with anyone
C) changing passwords every 30-60 days
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) the individual user
B) the company
C) the human resources department
D) the individual user's department
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) ediscovery
B) Child Online Protection Act
C) digital rights management
D) pirated software
Correct Answer
verified
Showing 121 - 140 of 331
Related Exams