Exam 26: Accessing Organizational Informationdata Warehouses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

A user can opt in of receiving emails by choosing to deny permission to incoming emails.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Which of the following definitions represents website name stealing?

Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
Verified

B

Which of the following definitions represents opt-in?

(Multiple Choice)
4.8/5
(37)

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

(Multiple Choice)
4.9/5
(41)

Which of the following contains general principles to guide computer user behavior?

(Multiple Choice)
4.9/5
(38)

What is an act or object that poses a danger to assets?

(Multiple Choice)
4.8/5
(38)

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?

(Multiple Choice)
4.9/5
(32)

A social media policy outlines the corporate guidelines or principles governing employee online communications.

(True/False)
4.7/5
(38)

What is one of the guidelines an organization can follow when creating an information privacy policy?

(Multiple Choice)
4.9/5
(37)

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed and what was purchased?

(Multiple Choice)
4.9/5
(37)

Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

(True/False)
4.9/5
(37)

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?

(Multiple Choice)
4.9/5
(43)

According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.

(Multiple Choice)
4.8/5
(41)

Which of the following represents the classic example of unintentional information reuse?

(Multiple Choice)
4.9/5
(35)

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

(Multiple Choice)
4.9/5
(34)

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ________ policy.

(Multiple Choice)
4.9/5
(28)

Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.

(True/False)
4.8/5
(38)

Different organizations and countries have their own terms for fair information practices. Which of the following is correct?

(Multiple Choice)
4.9/5
(32)

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

(Multiple Choice)
4.7/5
(38)
Showing 1 - 20 of 98
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)