Correct Answer
verified
Multiple Choice
A) Sending a massive amount of email to a specific person or system, resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system, resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls
Correct Answer
verified
Multiple Choice
A) Information code
B) Information technology
C) Information management
D) Information governance
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation
Correct Answer
verified
Multiple Choice
A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Standards of living
D) Security
Correct Answer
verified
Multiple Choice
A) Counterfeit is fake technology products; pirated is invisible technological cameras placed online.
B) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software; counterfeit is software that is manufactured to look like the real thing and sold as such.
C) Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software; pirated is software that is manufactured to look like the real thing and sold as such.
D) Pirated is stolen software used to hack into a company's classified material; counterfeit is a fake version of firewall software.
Correct Answer
verified
Multiple Choice
A) Key logger software
B) Spyware
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
Correct Answer
verified
Multiple Choice
A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Key logger
B) Stealthware
C) Clickstream
D) Web log
Correct Answer
verified
Showing 41 - 60 of 225
Related Exams