Filters
Question type

Study Flashcards

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

What is the difference between pirated and counterfeit software?


A) Counterfeit is fake technology products, where pirated is invisible technological cameras placed online
B) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such
C) Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software, where pirated is software that is manufactured to look like the real thing and sold as such
D) Pirated is stolen software used to hack into a company's classified material, where counterfeit is a fake version of firewall software

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A user can opt in to receive emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What are insiders?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is spear phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of the above

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What scrambles information into an alternative form that requires a key or password to decrypt?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

What program, when installed on a computer, records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.


A) The individual user
B) The company
C) The human resources department
D) The individual user's department

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

A) True
B) False

Correct Answer

verifed

verified

Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

A) True
B) False

Correct Answer

verifed

verified

Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

A user can opt in to receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

A worm spreads itself not only from file to file but also from computer to computer.

A) True
B) False

Correct Answer

verifed

verified

Single-factor authentication requires the user to provide two means of authentication, what the user knows (password)and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

Showing 321 - 340 of 354

Related Exams

Show Answer