A) something the user knows such as a user ID and password
B) something the user has such as a smart card or token
C) something that is part of the user such as a fingerprint or voice signature
D) A combination of all of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) iris scan
B) password
C) fingerprint
D) handwriting
Correct Answer
verified
Multiple Choice
A) a worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) a virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites
C) a virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) people misusing organizational information
B) technology failures
C) customers misusing organizational systems
D) company departments missing sales goals
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) quadrant IV
B) quadrants II and III
C) quadrant I
D) quadrant III
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) be as specific as possible stating when and what will be monitored
B) do not state the consequences of violating the policy
C) always enforce the policy the same for everyone
D) expressly communicate that the company reserves the right to monitor all employees
Correct Answer
verified
Multiple Choice
A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) digital certificate
B) encryption
C) decrypt
D) cryptography
Correct Answer
verified
Multiple Choice
A) an Internet workplace policy
B) a social media policy
C) a technology information policy
D) a YouTube policy
Correct Answer
verified
Multiple Choice
A) information security
B) physical security
C) drive-by hacking
D) adware
Correct Answer
verified
Multiple Choice
A) authentication and authorization, prevention and resistance, prevention and response
B) authentication and authorization, prevention and response, detection and response
C) analyzing and authenticating, prevention and repositioning, detection and response
D) authentication and authorization, prevention and resistance, detection and response
Correct Answer
verified
Multiple Choice
A) pharming
B) phishing
C) phishing expedition
D) spear phishing
Correct Answer
verified
Multiple Choice
A) smart card
B) fingerprint authentication
C) user ID
D) None of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 331
Related Exams