Correct Answer
verified
Multiple Choice
A) smart technology card
B) tokens
C) biometrics
D) passwords
Correct Answer
verified
Multiple Choice
A) per hour, per day, and per week
B) per employee, per computer, and per company
C) per stock, per stockholder, and per investment capital
D) None of these are correct.
Correct Answer
verified
Multiple Choice
A) information management
B) information compliance
C) information secrecy
D) information ethics
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) sniffer
B) spyware
C) spoofware
D) simplelocker
Correct Answer
verified
Multiple Choice
A) private key encryption
B) policy key encryption
C) public key encryption
D) protective key code
Correct Answer
verified
Multiple Choice
A) cyberbullying
B) cybervandalism
C) click-fraud
D) competitive click-fraud
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) zombie
B) zombie farm
C) pharming attack
D) pharming
Correct Answer
verified
Multiple Choice
A) legal expenses
B) loss in financial performance
C) damage to reputation
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) ethics
B) intellectual property
C) privacy
D) confidentiality
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) zombie
B) zombie farm
C) pharming attack
D) time bomb
Correct Answer
verified
Multiple Choice
A) pharming
B) phishing
C) phishing expedition
D) spear phishing
Correct Answer
verified
Multiple Choice
A) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization
Correct Answer
verified
Showing 301 - 320 of 331
Related Exams