Deck 26: Accessing Organizational Informationdata Warehouses
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/98
Play
Full screen (f)
Deck 26: Accessing Organizational Informationdata Warehouses
1
A social media policy outlines the corporate guidelines or principles governing employee online communications.
True
2
An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
True
3
Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
False
4
Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
5
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
6
Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
7
Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
8
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
9
Different organisations and countries have their own terms for these concerns. The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organisation for Economic Co-operation and Development (OECD) has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
10
Cybervandalism is the electronic defacing of an existing website.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
11
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
12
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
13
Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
14
Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
15
An ethical computer use policy contains general principles to guide computer user behavior.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
16
BYOD policies offer four basic options, including unlimited access for personal devices; access only to nonsensitive systems and data; access, but with IT control over personal devices, apps, and stored data; access, but preventing local storage of data on personal devices.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
17
Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
18
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
19
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
20
Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
21
Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
22
According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.
A) informed, collaborate
B) consent, informed
C) informed, consent
D) consent, information
A) informed, collaborate
B) consent, informed
C) informed, consent
D) consent, information
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following contains general principles to guide computer user behavior?
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
24
A user can opt out of receiving emails by choosing to deny permission to incoming emails.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
25
Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
26
A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
27
A user can opt out to receive emails by choosing to allow permissions to incoming emails.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
28
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?
A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Repudiation
A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Repudiation
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is not considered an epolicy?
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
31
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery
A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
32
Cyberbullying is an act or object that poses a danger to assets.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following clauses is typically contained in an acceptable use policy?
A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause
A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?
A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy
A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?
A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy
A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
36
A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or brand.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
37
A user can opt in of receiving emails by choosing to deny permission to incoming emails.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the below would not be found in a typical acceptable use policy?
A) Not using the service as part of violating any law.
B) Not posting commercial messages to groups where the employee has received user consent.
C) Not performing any repudiation.
D) Not attempting to break the security of any computer network.
A) Not using the service as part of violating any law.
B) Not posting commercial messages to groups where the employee has received user consent.
C) Not performing any repudiation.
D) Not attempting to break the security of any computer network.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
39
A user can opt in to receive emails by choosing to allow permissions to incoming emails.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
40
Which policy contains general principles regarding information privacy?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the below would you find in a typical Internet use policy?
A) User ramifications if the policy is violated.
B) User responsibility for properly handling offensive material.
C) User responsibility for protecting the company's good name.
D) All of these.
A) User ramifications if the policy is violated.
B) User responsibility for properly handling offensive material.
C) User responsibility for protecting the company's good name.
D) All of these.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
42
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.
A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
44
What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following represents the classic example of unintentional information reuse?
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
46
What is one of the guidelines an organization can follow when creating an information privacy policy?
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the choices are correct
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the choices are correct
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
47
What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed and what was purchased?
A) Key logger
B) Stealthware
C) Clickstream
D) Web log
A) Key logger
B) Stealthware
C) Clickstream
D) Web log
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
48
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ________ policy.
A) Internet use policy
B) social media policy
C) information use policy
D) employee monitoring policy
A) Internet use policy
B) social media policy
C) information use policy
D) employee monitoring policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
49
What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
50
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?
A) An information privacy policy.
B) An email privacy policy.
C) An Internet use policy.
D) A workplace monitoring policy.
A) An information privacy policy.
B) An email privacy policy.
C) An Internet use policy.
D) A workplace monitoring policy.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following policies details the extent to which email messages may be read by others?
A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy
A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
52
If an organization implemented only one policy, which one would it want to implement?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
53
With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures such as keystrokes, error rate, and number of transactions processed?
A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring
A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
54
What is one of the major problems with email?
A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of these
A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of these
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the below is a common Internet monitoring technology?
A) Key logger
B) Hardware key logger
C) Cookie
D) All of these
A) Key logger
B) Hardware key logger
C) Cookie
D) All of these
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
56
What is unsolicited email that plagues employees at all levels and clogs email systems?
A) Spyware
B) Spam
C) Adware
D) None of these
A) Spyware
B) Spam
C) Adware
D) None of these
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
57
Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?
A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy
A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the below should be included in a company email privacy policy?
A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization.
B) Discourages sending junk email or spam to anyone who doesn't want to receive it.
C) Informs users that the organization has no control over email once it has been transmitted outside the organization.
D) All of these.
A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization.
B) Discourages sending junk email or spam to anyone who doesn't want to receive it.
C) Informs users that the organization has no control over email once it has been transmitted outside the organization.
D) All of these.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
59
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these
A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
60
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.
A) the individual user
B) the company
C) the human resources department
D) the individual user's department
A) the individual user
B) the company
C) the human resources department
D) the individual user's department
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
61
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
62
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
63
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Anti-spam policy
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Anti-spam policy
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
64
What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
65
Which of the following is one of the four basic options included in a bring your own device policy?
A) Unlimited access for personal devices.
B) Access only to nonsensitive systems and data.
C) Access, but preventing local storage of data on personal devices.
D) All of these.
A) Unlimited access for personal devices.
B) Access only to nonsensitive systems and data.
C) Access, but preventing local storage of data on personal devices.
D) All of these.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following describes workplace MIS monitoring?
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
67
Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
68
What is a mail bomb?
A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
69
What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
70
Which policy details the extent to which email messages may be read by others?
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
71
What refers to denying permissions to incoming emails?
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
72
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
A) Cyberbullying
B) Information vandalism
C) Cookie
D) BYOD
A) Cyberbullying
B) Information vandalism
C) Cookie
D) BYOD
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
73
What is a program that, when installed on a computer, records every keystroke and mouse click?
A) Key logger software
B) Spyware
C) Cookie
D) Adware
A) Key logger software
B) Spyware
C) Cookie
D) Adware
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
74
Different organizations and countries have their own terms for fair information practices. Which of the following is correct?
A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"
A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
75
What is the electronic defacing of an existing website?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
76
What refers to choosing to allow permissions to incoming emails?
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
77
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
78
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
79
What is the electronic defacing of an existing website?
A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD
A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
80
What outlines the corporate guidelines or principles governing employee online communications?
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck