Exam Prep nan Plug-In B07 Ethics - Test Bank | Business Driven Tech 8e by Paige Baltzan by Paige Baltzan. DOCX document preview.

Exam Prep nan Plug-In B07 Ethics

Business Driven Technology, 8e (Baltzan)

Plug-In B07 Ethics

1) Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

2) An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

3) Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

4) A social media policy outlines the corporate guidelines or principles governing employee online communications.

5) An ethical computer use policy contains general principles to guide computer user behavior.

6) Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

7) Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

8) Cybervandalism is the electronic defacing of an existing website.

9) Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

10) Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

11) Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

12) Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

13) Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

14) Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

15) Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

16) Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

17) BYOD policies offer four basic options, including unlimited access for personal devices; access only to nonsensitive systems and data; access, but with IT control over personal devices, apps, and stored data; access, but preventing local storage of data on personal devices.

18) Different organisations and countries have their own terms for these concerns. The United Kingdom terms it "Data Protection," and the European Union calls it "Personal Data Privacy"; the Organisation for Economic Co-operation and Development (OECD) has written Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.

19) Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

20) Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

21) Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

22) A user can opt out of receiving emails by choosing to deny permission to incoming emails.

23) A user can opt in to receive emails by choosing to allow permissions to incoming emails.

24) A user can opt in of receiving emails by choosing to deny permission to incoming emails.

25) A user can opt out to receive emails by choosing to allow permissions to incoming emails.

26) Social media monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand.

27) A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

28) A social media manager refers to the process of monitoring and responding to what is being said about a company, individual, product, or brand.

29) Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

30) Cyberbullying is an act or object that poses a danger to assets.

31) What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

A) Information systems policy

B) Epolicies

C) Technology applied policy

D) Emastery

32) Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?

A) Information privacy policy

B) Workplace monitoring policy

C) Acceptable use policy

D) Downtime monitoring policy

33) Which of the following contains general principles to guide computer user behavior?

A) Information technology code

B) Technology policy

C) Ethical computer use policy

D) Information systems

34) Which of the following clauses is typically contained in an acceptable use policy?

A) A nonrepudiation clause

B) A repudiation clause

C) A confidentiality clause

D) An employee use clause

35) Which of the below would not be found in a typical acceptable use policy?

A) Not using the service as part of violating any law.

B) Not posting commercial messages to groups where the employee has received user consent.

C) Not performing any repudiation.

D) Not attempting to break the security of any computer network.

36) Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?

A) Compliance

B) Noncommittal

C) Nonrepudiation

D) Repudiation

37) According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.

A) informed, collaborate

B) consent, informed

C) informed, consent

D) consent, information

38) Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?

A) Acceptable use policy

B) Social media policy

C) Information privacy policy

D) Email privacy policy

39) Which of the following is not considered an epolicy?

A) Acceptable use policy

B) Internet use policy

C) Ethical computer use policy

D) Anti-hacker use policy

40) Which policy contains general principles regarding information privacy?

A) Information privacy policy

B) Acceptable use policy

C) Internet use policy

D) Anti-spam policy

41) Which of the following represents the classic example of unintentional information reuse?

A) Phone number

B) Social Security number

C) Address

D) Driver's license number

42) What is one of the guidelines an organization can follow when creating an information privacy policy?

A) Adoption and implementation of an anti-spam policy

B) Notice and disclosure

C) Choice and quality

D) None of the choices are correct

43) What is one of the major problems with email?

A) Intellectual property

B) Nonrepudiation

C) User's expectation of privacy

D) None of these

44) If an organization implemented only one policy, which one would it want to implement?

A) Information privacy policy

B) Acceptable use policy

C) Internet use policy

D) Ethical computer use policy

45) Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?

A) An information privacy policy.

B) An email privacy policy.

C) An Internet use policy.

D) A workplace monitoring policy.

46) Which of the below would you find in a typical Internet use policy?

A) User ramifications if the policy is violated.

B) User responsibility for properly handling offensive material.

C) User responsibility for protecting the company's good name.

D) All of these.

47) Which of the following policies details the extent to which email messages may be read by others?

A) Email privacy policy

B) Email confidential policy

C) Anti-spam policy

D) Spam policy

48) Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.

A) the individual user

B) the company

C) the human resources department

D) the individual user's department

49) Which of the below should be included in a company email privacy policy?

A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization.

B) Discourages sending junk email or spam to anyone who doesn't want to receive it.

C) Informs users that the organization has no control over email once it has been transmitted outside the organization.

D) All of these.

50) What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?

A) Mail bomb

B) Spam

C) Intellectual spam

D) Junk mail

51) What is unsolicited email that plagues employees at all levels and clogs email systems?

A) Spyware

B) Spam

C) Adware

D) None of these

52) What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?

A) Email privacy policy

B) Spam policy and procedures

C) Anti-spam policy

D) Internet user policy

53) To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ________ policy.

A) Internet use policy

B) social media policy

C) information use policy

D) employee monitoring policy

54) Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?

A) Building a strong brand identity

B) Protecting the company reputation through counter-damage control

C) Engaging directly with customers and prospective customers

D) All of these

55) Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?

A) An Internet workplace policy

B) A social media policy

C) A technology information policy

D) A YouTube policy

56) With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures such as keystrokes, error rate, and number of transactions processed?

A) Anti-spam system

B) Information intelligence system

C) Workplace MIS monitoring

D) Company technology monitoring

57) Which of the below is a common Internet monitoring technology?

A) Key logger

B) Hardware key logger

C) Cookie

D) All of these

58) What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?

A) Spyware

B) Web log

C) Adware

D) Hardware key logger

59) What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed and what was purchased?

A) Key logger

B) Stealthware

C) Clickstream

D) Web log

60) Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?

A) Be as specific as possible stating when and what will be monitored.

B) Do not state the consequences of violating the policy.

C) Always enforce the policy the same for everyone.

D) Expressly communicate that the company reserves the right to monitor all employees.

61) What is a mail bomb?

A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space

B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions

C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space

D) A contractual stipulation to ensure that ebusiness participants deny their online actions

62) Which policy details the extent to which email messages may be read by others?

A) Acceptable use policy

B) Email privacy policy

C) Internet use policy

D) All of these

63) Which of the following describes workplace MIS monitoring?

A) Tracking people's activities by such measures as number of keystrokes

B) Tracking people's activities by such measures as error rate

C) Tracking people's activities by such measures as number of transactions processed

D) All of these

64) What is a program that, when installed on a computer, records every keystroke and mouse click?

A) Key logger software

B) Spyware

C) Cookie

D) Adware

65) What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

A) Key logger

B) Hardware key logger

C) Cookie

D) Adware

66) What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

A) Cyberbullying

B) Information vandalism

C) Cookie

D) BYOD

67) What is the electronic defacing of an existing website?

A) Information bullying

B) Cybervandalism

C) Cookie

D) BYOD

68) What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

A) Cyberbullying

B) Cybervandalism

C) Click-fraud

D) Competitive click-fraud

69) What is the electronic defacing of an existing website?

A) Cyberbullying

B) Cybervandalism

C) Click-fraud

D) Competitive click-fraud

70) What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?

A) Cyberbullying

B) Fair information practices

C) Click-fraud

D) Bring Your Own Device

71) What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?

A) Cyberbullying

B) Fair information practices

C) Click-fraud

D) Bring Your Own Device

72) Which of the following is one of the four basic options included in a bring your own device policy?

A) Unlimited access for personal devices.

B) Access only to nonsensitive systems and data.

C) Access, but preventing local storage of data on personal devices.

D) All of these.

73) Different organizations and countries have their own terms for fair information practices. Which of the following is correct?

A) The United Kingdom terms it "Data Protection"

B) The European Union terms it "Data Protection"

C) The United Kingdom terms it "Personal Data Privacy"

D) The United States terms it "Personal Data Privacy"

74) What refers to denying permissions to incoming emails?

A) Opt out

B) Opt in

C) BYOD

D) Nonrepudiation

75) What refers to choosing to allow permissions to incoming emails?

A) Opt out

B) Opt in

C) BYOD

D) Nonrepudiation

76) What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

A) Social media monitoring

B) Social media manager

C) Social media policy

D) Anti-spam policy

77) Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?

A) Social media monitoring

B) Social media manager

C) Social media policy

D) Information privacy manager

78) What outlines the corporate guidelines or principles governing employee online communications?

A) Social media monitoring

B) Social media manager

C) Social media policy

D) Information privacy manager

79) What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

A) Cyberbullying

B) Cybervandalism

C) Click-fraud

D) Competitive click-fraud

80) What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?

A) Cyberbullying

B) Cybervandalism

C) Click-fraud

D) Competitive click-fraud

81) What is an act or object that poses a danger to assets?

A) Cyberbullying

B) Threat

C) Click-fraud

D) Competitive click-fraud

82) What is cybervandalism?

A) The electronic defacing of an existing website.

B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

D) An act or object that poses a danger to assets.

83) What is click-fraud?

A) The electronic defacing of an existing website.

B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

D) An act or object that poses a danger to assets.

84) What is competitive click-fraud?

A) The electronic defacing of an existing website.

B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

D) An act or object that poses a danger to assets.

85) What is a threat?

A) The electronic defacing of an existing website.

B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

D) An act or object that poses a danger to assets.

86) What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

A) Typosquatting

B) Website name stealing

C) Internet censorship

D) Teergrubing

87) What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

A) Typosquatting

B) Website name stealing

C) Internet censorship

D) Teergrubing

88) What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?

A) Typosquatting

B) Website name stealing

C) Internet censorship

D) Teergrubing

89) What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?

A) Typosquatting

B) Website name stealing

C) Internet censorship

D) Teergrubing

90) What occurs when a person chooses to deny permission to incoming emails?

A) Opt out

B) Website name stealing

C) Internet censorship

D) Teergrubing

91) Which of the following definitions represents typosquatting?

A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

92) Which of the following definitions represents website name stealing?

A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

93) Which of the following definitions represents Internet censorship?

A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

94) Which of the following definitions represents teergrubing?

A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

95) Which of the following definitions represents opt-out?

A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

C) Choosing to allow permission to incoming emails

D) Choosing to deny permission to incoming emails.

96) Which of the following definitions represents opt-in?

A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

C) Choosing to allow permission to incoming emails

D) Choosing to deny permission to incoming emails.

97) Which of the following definitions represents physical security?

A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

B) Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.

C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

D) Choosing to deny permission to incoming emails.

98) Identify the six epolicies organizations should implement to protect themselves.

Document Information

Document Type:
DOCX
Chapter Number:
All in one
Created Date:
Aug 21, 2025
Chapter Name:
Plug-In B07 Ethics
Author:
Paige Baltzan

Connected Book

Test Bank | Business Driven Tech 8e by Paige Baltzan

By Paige Baltzan

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party