A) Sniffer
B) Spyware
C) Spoofware
D) Splog
Correct Answer
verified
Multiple Choice
A) Pharming
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of the above
Correct Answer
verified
Multiple Choice
A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD
Correct Answer
verified
Multiple Choice
A) Voice
B) Face
C) Iris
D) All of the above
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The United Kingdom terms it "Data Protection"
B) The European Union terms it "Data Protection"
C) The United Kingdom terms it "Personal Data Privacy"
D) The United States terms it "Personal Data Privacy"
Correct Answer
verified
Multiple Choice
A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and Denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of the above
Correct Answer
verified
Multiple Choice
A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
Showing 1 - 20 of 354
Related Exams