Filters
Question type

Study Flashcards

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

What is information secrecy?


A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What scrambles information into an alternative form that requires a key or password to decrypt?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?


A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is vishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.

A) True
B) False

Correct Answer

verifed

verified

What can encryption technology perform?


A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?


A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of these

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys, one for public and one for private?


A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Using one's social skills to trick people into revealing access credentials or other valuable information is called ________.


A) social engineering
B) social media
C) social viruses
D) social processes

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is single-factor authentication?


A) The traditional security process, which requires a username and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?


A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 113

Related Exams

Show Answer