Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
Multiple Choice
A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting
Correct Answer
verified
Multiple Choice
A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of these
Correct Answer
verified
Multiple Choice
A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code
Correct Answer
verified
Multiple Choice
A) social engineering
B) social media
C) social viruses
D) social processes
Correct Answer
verified
Multiple Choice
A) The traditional security process, which requires a username and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
Multiple Choice
A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls
Correct Answer
verified
Showing 61 - 80 of 113
Related Exams