Filters
Question type

Study Flashcards

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

A) True
B) False

Correct Answer

verifed

verified

Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

A) True
B) False

Correct Answer

verifed

verified

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

What is dumpster diving?


A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker that looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?


A) polymorphic virus
B) worm
C) Trojan-horse virus
D) backdoor programs

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a mail bomb?


A) sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) a contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) a contractual stipulation to ensure that ebusiness participants deny their online actions

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?


A) eauthorization
B) emanagement
C) ediscovery
D) epolicies

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) token
B) password
C) smart card
D) biometrics

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

What is a hacker?


A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

What is spyware?


A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?


A) building a strong brand identity
B) protecting the company reputation through counter-damage control
C) engaging directly with customers and prospective customers
D) All of these are correct.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?


A) social media monitoring
B) social media manager
C) social media policy
D) information privacy manager

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Script kiddies have criminal intent when hacking.

A) True
B) False

Correct Answer

verifed

verified

What is multifactor authentication?


A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) spyware
B) hacker
C) drive-by hacking
D) adware

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?


A) key logger
B) hardware key logger
C) cookie
D) adware

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?


A) acceptable use policy
B) social media policy
C) information privacy policy
D) email privacy policy

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 81 - 100 of 331

Related Exams

Show Answer