Filters
Question type

Study Flashcards

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Sniffer
B) Spyware
C) Spoofware
D) Splog

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?


A) Pharming
B) Authentication
C) Authorization
D) Programming

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following definitions represents typosquatting?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Two-factor authentication requires the user to provide two means of authentication, what the user knows (password)and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false website?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?


A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of the above

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Script-kiddies have criminal intent when hacking.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the biggest problem of information security breaches?


A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Worms are computer viruses that wait for a specific date before executing their instructions.

A) True
B) False

Correct Answer

verifed

verified

Different organizations and countries have their own terms for fair information practices. Which of the following is correct?


A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?


A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

C

Cybervandalism is the electronic defacing of an existing website.

A) True
B) False

Correct Answer

verifed

verified

Which of the following are all common forms of viruses?


A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and Denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

C

What is multifactor authentication?


A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

C

What is adware?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 354

Related Exams

Show Answer