A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of the above
Correct Answer
verified
Multiple Choice
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-Spam policy
Correct Answer
verified
Multiple Choice
A) Technology first,customers second
B) Technology first,people second
C) Innovation first,technology second
D) People first,technology second
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of the above
Correct Answer
verified
Multiple Choice
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the above
Correct Answer
verified
Multiple Choice
A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees
Correct Answer
verified
Short Answer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above
Correct Answer
verified
Multiple Choice
A) Information spy
B) Hacker
C) Spyware
D) Adware
Correct Answer
verified
Multiple Choice
A) Content filtering,encryption,and firewalls
B) Calculating,locking,and firewalls
C) Content prohibiting,and cookies
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
Correct Answer
verified
Showing 321 - 340 of 342
Related Exams