Study online at https://quizlet.com/_i0obmt
1. ______ is a problem that occurs when someone registers purposely misspelled
variations of well-known names
-these variants sometimes lure consumers who make typographical errors
when entering a URL: typo squatting
2. which policy stating explicitly how, when, and where the company monitors
its employees?
-email monitoring policy
-employee monitoring policy
-information monitoring policy: employee monitoring policy
3. A(n) ______ monitoring policy states explicitly how, when, and where the
company monitors its employees: employee monitoring policy
4. Select the two terms that refer to the ability of a company to identify, search,
gather, seize, or export digital information in responding to a litigation, audit,
investigation, or information inquiry
-electronic discovery
-electronic protection act
-ediscovery
-information discovery: -electronic discovery
-ediscovery
5. break into other peoples computer systems and may just look around or may
steal and destroy information: black-hat hackers
6. work at the request of the system owners to find system vulnerabilities and
plug the holes: white hat hackers
7. find hacking code on the internet and click-and-point their way into systems
to cause damage or spread viruses
A. cyberterrorist
B. script kiddies
C. activist
D. black hat hackers: b. script kiddies
8. have philosophical and political reasons for breaking into systems and will
often deface the website as a protest
a. script kiddies
, MIS 309 ch. 4 Exam Questions With All Correct Detailed Answers
Study online at https://quizlet.com/_i0obmt
b. cracker
c. cyberterrorist
d. hactivist: D. hactivist
9. seek to cause harm to people or to destroy critical systems or information
and use the internet as a weapon of mass destruction
a. cracker
b. cyberterrorist
c. white hat hackers
d. hactivist: b. cyberterrorist
10. these hackers have criminal intent when hacking: cracker
11. website name ______ is the theft of a websites name that occurs when some-
one, posing as a sites administrator, changes the ownership of the domain
name assigned to the website to another website owner: web name stealing
12. what is a technological solution that allows publishers to control their digital
media to discourage, limit, or prevent illegal copying and distribution?
-digital rights management
-pirated software
-counterfeit software
-intellectual property: digital rights management
13. _____ is unsolicited email.
It plagues employees at all levels within an organization, from receptionist to
CEO, and clogs email systems and siphons MIS resources away from legitimate
business project: spam
14. what is an act or object that poses a danger to assets?
a. threat
b. epolicies
c. cyberbullying
d. click-fraud: a. threat
15. Select two accurate statements relating to an ethical computer use policy
-users need to create the rules
-users need to accept the rules
-users need to consent to following the rules