Exam Prep nan Plug-In B07 Ethics - Test Bank | Business Driven Tech 8e by Paige Baltzan by Paige Baltzan. DOCX document preview.
Business Driven Technology, 8e (Baltzan)
Plug-In B07 Ethics
1) Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
2) An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
3) Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
4) A social media policy outlines the corporate guidelines or principles governing employee online communications.
5) An ethical computer use policy contains general principles to guide computer user behavior.
6) Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
7) Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
8) Cybervandalism is the electronic defacing of an existing website.
9) Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
10) Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
11) Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
12) Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
13) Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
14) Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
15) Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
16) Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
17) BYOD policies offer four basic options, including unlimited access for personal devices; access only to nonsensitive systems and data; access, but with IT control over personal devices, apps, and stored data; access, but preventing local storage of data on personal devices.
18) Different organisations and countries have their own terms for these concerns. The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organisation for Economic Co-operation and Development (OECD) has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.
19) Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
20) Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
21) Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
22) A user can opt out of receiving emails by choosing to deny permission to incoming emails.
23) A user can opt in to receive emails by choosing to allow permissions to incoming emails.
24) A user can opt in of receiving emails by choosing to deny permission to incoming emails.
25) A user can opt out to receive emails by choosing to allow permissions to incoming emails.
26) Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.
27) A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.
28) A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or brand.
29) Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.
30) Cyberbullying is an act or object that poses a danger to assets.
31) What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery
32) Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?
A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy
33) Which of the following contains general principles to guide computer user behavior?
A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems
34) Which of the following clauses is typically contained in an acceptable use policy?
A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause
35) Which of the below would not be found in a typical acceptable use policy?
A) Not using the service as part of violating any law.
B) Not posting commercial messages to groups where the employee has received user consent.
C) Not performing any repudiation.
D) Not attempting to break the security of any computer network.
36) Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?
A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Repudiation
37) According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.
A) informed, collaborate
B) consent, informed
C) informed, consent
D) consent, information
38) Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?
A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy
39) Which of the following is not considered an epolicy?
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy
40) Which policy contains general principles regarding information privacy?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy
41) Which of the following represents the classic example of unintentional information reuse?
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
42) What is one of the guidelines an organization can follow when creating an information privacy policy?
A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the choices are correct
43) What is one of the major problems with email?
A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of these
44) If an organization implemented only one policy, which one would it want to implement?
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
45) Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?
A) An information privacy policy.
B) An email privacy policy.
C) An Internet use policy.
D) A workplace monitoring policy.
46) Which of the below would you find in a typical Internet use policy?
A) User ramifications if the policy is violated.
B) User responsibility for properly handling offensive material.
C) User responsibility for protecting the company's good name.
D) All of these.
47) Which of the following policies details the extent to which email messages may be read by others?
A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy
48) Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.
A) the individual user
B) the company
C) the human resources department
D) the individual user's department
49) Which of the below should be included in a company email privacy policy?
A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization.
B) Discourages sending junk email or spam to anyone who doesn't want to receive it.
C) Informs users that the organization has no control over email once it has been transmitted outside the organization.
D) All of these.
50) What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
51) What is unsolicited email that plagues employees at all levels and clogs email systems?
A) Spyware
B) Spam
C) Adware
D) None of these
52) What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
53) To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ________ policy.
A) Internet use policy
B) social media policy
C) information use policy
D) employee monitoring policy
54) Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these
55) Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?
A) An Internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy
56) With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures such as keystrokes, error rate, and number of transactions processed?
A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring
57) Which of the below is a common Internet monitoring technology?
A) Key logger
B) Hardware key logger
C) Cookie
D) All of these
58) What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
59) What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed and what was purchased?
A) Key logger
B) Stealthware
C) Clickstream
D) Web log
60) Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.
61) What is a mail bomb?
A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
62) Which policy details the extent to which email messages may be read by others?
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these
63) Which of the following describes workplace MIS monitoring?
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these
64) What is a program that, when installed on a computer, records every keystroke and mouse click?
A) Key logger software
B) Spyware
C) Cookie
D) Adware
65) What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
66) What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
A) Cyberbullying
B) Information vandalism
C) Cookie
D) BYOD
67) What is the electronic defacing of an existing website?
A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD
68) What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
69) What is the electronic defacing of an existing website?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
70) What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
71) What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
72) Which of the following is one of the four basic options included in a bring your own device policy?
A) Unlimited access for personal devices.
B) Access only to nonsensitive systems and data.
C) Access, but preventing local storage of data on personal devices.
D) All of these.
73) Different organizations and countries have their own terms for fair information practices. Which of the following is correct?
A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"
74) What refers to denying permissions to incoming emails?
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
75) What refers to choosing to allow permissions to incoming emails?
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
76) What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Anti-spam policy
77) Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
78) What outlines the corporate guidelines or principles governing employee online communications?
A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
79) What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
80) What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
81) What is an act or object that poses a danger to assets?
A) Cyberbullying
B) Threat
C) Click-fraud
D) Competitive click-fraud
82) What is cybervandalism?
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
83) What is click-fraud?
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
84) What is competitive click-fraud?
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
85) What is a threat?
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
86) What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
87) What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
88) What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
89) What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
90) What occurs when a person chooses to deny permission to incoming emails?
A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing
91) Which of the following definitions represents typosquatting?
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
92) Which of the following definitions represents website name stealing?
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
93) Which of the following definitions represents Internet censorship?
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
94) Which of the following definitions represents teergrubing?
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
95) Which of the following definitions represents opt-out?
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.
96) Which of the following definitions represents opt-in?
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails.
97) Which of the following definitions represents physical security?
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) Choosing to deny permission to incoming emails.
98) Identify the six epolicies organizations should implement to protect themselves.
Document Information
Connected Book
Test Bank | Business Driven Tech 8e by Paige Baltzan
By Paige Baltzan