Filters
Question type

Study Flashcards

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

Backdoor programs open a way into the network for future attacks.

A) True
B) False

Correct Answer

verifed

verified

Using ones social skills to trick people into revealing access credentials or other valuable information is called ________.


A) Social engineering
B) Social media
C) Social viruses
D) Social processes

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

What outlines the corporate guidelines or principles governing employee online communications?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What are computer viruses that wait for a specific date before executing their instructions?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is it called when a hacker looks through your trash to find personal information?


A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

A) True
B) False

Correct Answer

verifed

verified

As the President of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively. What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What is single-factor authentication?


A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

BYOD policies offer four basic options, including unlimited access for personal devices, access only to nonsensitive systems and data, access, but with IT control over personal devices, apps, and stored data, access, but preventing local storage of data on personal devices.

A) True
B) False

Correct Answer

verifed

verified

What includes individuals that seek notoriety or want to make a social or political point such as WikiLeaks?


A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

A) True
B) False

Correct Answer

verifed

verified

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

Showing 301 - 320 of 354

Related Exams

Show Answer