Filters
Question type

Study Flashcards

Teergrubing is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

A) True
B) False

Correct Answer

verifed

verified

The best and most effective way to manage authentication is through ________.


A) smart technology card
B) tokens
C) biometrics
D) passwords

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) per hour, per day, and per week
B) per employee, per computer, and per company
C) per stock, per stockholder, and per investment capital
D) None of these are correct.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) information management
B) information compliance
C) information secrecy
D) information ethics

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

To decrypt information is to decode it and is the opposite of encrypt.

A) True
B) False

Correct Answer

verifed

verified

What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?


A) sniffer
B) spyware
C) spoofware
D) simplelocker

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys, one for public and one for private?


A) private key encryption
B) policy key encryption
C) public key encryption
D) protective key code

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?


A) cyberbullying
B) cybervandalism
C) click-fraud
D) competitive click-fraud

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

A) True
B) False

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) zombie
B) zombie farm
C) pharming attack
D) pharming

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) legal expenses
B) loss in financial performance
C) damage to reputation
D) All of these are correct.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?


A) ethics
B) intellectual property
C) privacy
D) confidentiality

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

What are computer viruses that wait for a specific date before executing their instructions?


A) zombie
B) zombie farm
C) pharming attack
D) time bomb

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) pharming
B) phishing
C) phishing expedition
D) spear phishing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is information secrecy?


A) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Showing 301 - 320 of 331

Related Exams

Show Answer