Filters
Question type

Study Flashcards

What is the most secure type of authentication?


A) something the user knows such as a user ID and password
B) something the user has such as a smart card or token
C) something that is part of the user such as a fingerprint or voice signature
D) A combination of all of these are correct.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not considered a form of biometrics?


A) iris scan
B) password
C) fingerprint
D) handwriting

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) a worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) a virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites
C) a virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of these are correct.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following represents the biggest problem of information security breaches?


A) people misusing organizational information
B) technology failures
C) customers misusing organizational systems
D) company departments missing sales goals

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?


A) quadrant IV
B) quadrants II and III
C) quadrant I
D) quadrant III

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A worm spreads itself not only from file to file but also from computer to computer.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) be as specific as possible stating when and what will be monitored
B) do not state the consequences of violating the policy
C) always enforce the policy the same for everyone
D) expressly communicate that the company reserves the right to monitor all employees

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is simplelocker?


A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) digital certificate
B) encryption
C) decrypt
D) cryptography

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) an Internet workplace policy
B) a social media policy
C) a technology information policy
D) a YouTube policy

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?


A) information security
B) physical security
C) drive-by hacking
D) adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) authentication and authorization, prevention and resistance, prevention and response
B) authentication and authorization, prevention and response, detection and response
C) analyzing and authenticating, prevention and repositioning, detection and response
D) authentication and authorization, prevention and resistance, detection and response

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is a masquerading attack that combines spam with spoofing?


A) pharming
B) phishing
C) phishing expedition
D) spear phishing

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) smart card
B) fingerprint authentication
C) user ID
D) None of these are correct.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 331

Related Exams

Show Answer