Filters
Question type

Study Flashcards

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Phishing expedition is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter his or her username, password, and sometimes credit card information.

A) True
B) False

Correct Answer

verifed

verified

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?


A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

A) True
B) False

Correct Answer

verifed

verified

Imagine you accidentally mistype the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of?


A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?


A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?


A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?


A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A company should be able to calculate the cost of downtime by which of the following?


A) Per hour, per day, and per week
B) Per employee, per computer, and per company
C) Per stock, per stockholder, and per investment capital
D) None of the above

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

A) True
B) False

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) Technology first, customers second
B) Technology first, people second
C) Innovation first, technology second
D) People first, technology second

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is malware?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is simplelocker?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals?


A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 101 - 120 of 354

Related Exams

Show Answer