Filters
Question type

Study Flashcards

Discuss the features and benefits of continuous data protection.

Correct Answer

verifed

verified

For an even higher level of security tha...

View Answer

The primary function of employee monitoring is to track employee productivity.

A) True
B) False

Correct Answer

verifed

verified

For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.


A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A fraud or scam carried out through the Internet is a form of ____.


A) e-con
B) dot con
C) dot fraud
D) e-scam

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Collecting in-depth information about an individual is known as ____.


A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Computer crime, sometimes referred to as ____________________ includes any illegal act involving a computer.

Correct Answer

verifed

verified

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.


A) protection history
B) consumer policy
C) privacy record
D) privacy policy

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Access for each employee at a company should be limited to only the resources needed for his or her job (referred to as the ____________________) and the company should monitor for any attempts to access off-limit resources.

Correct Answer

verifed

verified

Principle ...

View Answer

Advocates of war driving and cyberstalking  state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________

A) True
B) False

Correct Answer

verifed

verified

Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.


A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.


A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.


A) opt out
B) disengage
C) build filters
D) block contact

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Discuss the purpose of kill switches and describe how they function.

Correct Answer

verifed

verified

Due to the rising number of violent thef...

View Answer

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.


A) codes of conduct
B) use guides
C) social media etiquette
D) operations path

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.


A) piracy policy
B) security policy
C) identity policy
D) privacy policy

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

____ are designed to withstand much more physical abuse than conventional devices.


A) Secured  devices
B) Ruggedized  devices
C) Malleable  devices
D) Flexible  devices

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A disaster recovery plan is also called a business continuity plan.

A) True
B) False

Correct Answer

verifed

verified

Public key encryption is also called asymmetric key encryption.

A) True
B) False

Correct Answer

verifed

verified

Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.

A) True
B) False

Correct Answer

verifed

verified

____________________ occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but is not as represented.

Correct Answer

verifed

verified

Online auc...

View Answer

Showing 81 - 100 of 100

Related Exams

Show Answer