Filters
Question type

Study Flashcards

Phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username,password,and sometimes credit card information.

A) True
B) False

Correct Answer

verifed

verified

All of the following are types of information security breaches except:


A) Insiders
B) E-Espionage
C) Dumpster diving
D) E-discovery

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts a trusted third party to verify information.One of Charles' largest clients is CheckMd,which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMD?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was,what ads were viewed and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

C

______________ property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

Correct Answer

verifed

verified

Intellectual

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.


A) Informed;collaborate
B) Consent;informed
C) Informed;consent
D) Consent;information

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.

A) True
B) False

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers,resolving customer issues,and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?


A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Enter white or black in the space below: _________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent,detect,and remove known viruses,adware,and spyware?


A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following represents the two fundamental building blocks that protect organizational information?


A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

What is it called when a hacker looks through your trash to find personal information?


A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Internet ____________ is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?


A) Backdoor programs
B) Drive-by Hacking
C) Polymorphic viruses and worms
D) Hacker

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

An email ____________ policy details the extent to which email messages may be read by others.

Correct Answer

verifed

verified

What is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

C

Showing 1 - 20 of 342

Related Exams

Show Answer