A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the above
Correct Answer
verified
Multiple Choice
A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Security badge policy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
Multiple Choice
A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Correct Answer
verified
Multiple Choice
A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Copyright
D) Privacy
Correct Answer
verified
Multiple Choice
A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above.
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) All of the above
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) None of the above
Correct Answer
verified
Showing 1 - 20 of 71
Related Exams