Which Of The Below Is A Common Internet Monitoring Technology

Question: Which of the below is a common Internet monitoring technology?

Answer: -Hardware key logger

-Cookie

-Key logger

-

Question: The best and most effective way to manage authentication is through ________.

Answer: Biometrics

Question: A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game. T/F

Answer: False

Question: What is spyware?

Answer: A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

Question: What is a form of social engineering in which one individual lies to obtain confidential data about another individual?

Answer: Pretexting

Question: Which of the following describes workplace MIS monitoring?

Answer: -Tracking people’s activities by such measures as number of transactions processed

-Tracking people’s activities by such measures as error rate

-Tracking people’s activities by such measures as number of keystrokes

-

Question: What reroutes requests for legitimate websites to false websites?

Answer: Pharming

Question: What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

Answer: Cyberbullying

Question: Which of the following is the main drawback of biometrics?

Answer: It can be costly and intrusive

Question: What are biometrics?

Answer: The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.