A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
Multiple Choice
A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of the above
Correct Answer
verified
Multiple Choice
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card
Correct Answer
verified
Multiple Choice
A) Informed, collaborate
B) Consent, informed
C) Informed, consent
D) Consent, information
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy
Correct Answer
verified
Multiple Choice
A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of the above
Correct Answer
verified
Multiple Choice
A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery
Correct Answer
verified
Showing 41 - 60 of 354
Related Exams