Correct Answer
verified
Multiple Choice
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Correct Answer
verified
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the answers is correct
Correct Answer
verified
Multiple Choice
A) Is your data protected even in foreign jurisdictions?
B) What kinds of security measures are provided?
C) For how long will the cloud service provider hold the data of your business,and what protocols have been established to back up or destroy your data?
D) All of the answers are correct
Correct Answer
verified
Multiple Choice
A) Information governance
B) Information privacy policy
C) Ethical computer use policy
D) Acceptable use policy
Correct Answer
verified
Not Answered
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information technology code
B) Techie policy
C) Ethical computer use policy
D) Information systems
Correct Answer
verified
Multiple Choice
A) Black-hat,cracker,cyberterrorist,hactivist,script kiddy and white-hat hacker
B) Black-top,cookie,script kid,environment,Web 3.0 and white-top hacker
C) Black-hat,script kiddy,script bat,spider crawler,Ad spiders and white-hat hacker
D) None of the answers is correct
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Power outages
B) Tornados
C) A system upgrade
D) Network failure
Correct Answer
verified
Multiple Choice
A) Striker bunny
B) Dumpster diving
C) Rubbish retrieval
D) Approved consent
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy
Correct Answer
verified
Multiple Choice
A) Key logger
B) Stealthware
C) Clickstream
D) Web log
Correct Answer
verified
Not Answered
Correct Answer
verified
Multiple Choice
A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver
Correct Answer
verified
Multiple Choice
A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords
Correct Answer
verified
Showing 61 - 80 of 80
Related Exams