A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of the above
Correct Answer
verified
Multiple Choice
A) Phishing
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Multiple Choice
A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of the above
Correct Answer
verified
Multiple Choice
A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) All of the above
Correct Answer
verified
Multiple Choice
A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer
Correct Answer
verified
Multiple Choice
A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
Multiple Choice
A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker that looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Virus
C) Hacker
D) Worm
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Showing 281 - 300 of 354
Related Exams