Filters
Question type

Study Flashcards

Which of the below defines information security?


A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Phishing
B) Authentication
C) Authorization
D) Programming

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of the above

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

The most secure procedures combine which of the following authentication and authorization techniques?


A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) All of the above

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?


A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

A) True
B) False

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

What requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?


A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What is dumpster diving?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker that looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge known as?


A) Elevation of privilege
B) Virus
C) Hacker
D) Worm

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?


A) Cyberbulling
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 281 - 300 of 354

Related Exams

Show Answer