Filters
Question type

Study Flashcards

What is ediscovery?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is a masquerading attack that combines spam with spoofing?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not considered a form of biometrics?


A) Iris scan
B) Password
C) Fingerprint
D) Handwriting

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) Authentication and authorization, prevention and resistance, prevention and response
B) Authentication and authorization, prevention and response, detection and response
C) Analyzing and authenticating, prevention and repositioning, detection and response
D) Authentication and authorization, prevention and resistance, detection and response

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?


A) Key logger
B) Hardware key logger
C) Cookie
D) Adware

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is pharming?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What occurs when a person chooses to deny permission to incoming emails?


A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1)authentication and authorization, (2)prevention and resistance, and (3)detection and response.

Correct Answer

verifed

verified

Authentication and authorization: Authen...

View Answer

Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys, one for public and one for private?


A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

What can encryption technology perform?


A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of the above

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

A) True
B) False

Correct Answer

verifed

verified

Showing 241 - 260 of 354

Related Exams

Show Answer