Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker that looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
Multiple Choice
A) polymorphic virus
B) worm
C) Trojan-horse virus
D) backdoor programs
Correct Answer
verified
Multiple Choice
A) sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) a contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) a contractual stipulation to ensure that ebusiness participants deny their online actions
Correct Answer
verified
Multiple Choice
A) eauthorization
B) emanagement
C) ediscovery
D) epolicies
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) token
B) password
C) smart card
D) biometrics
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
Multiple Choice
A) building a strong brand identity
B) protecting the company reputation through counter-damage control
C) engaging directly with customers and prospective customers
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) social media monitoring
B) social media manager
C) social media policy
D) information privacy manager
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting
Correct Answer
verified
Multiple Choice
A) spyware
B) hacker
C) drive-by hacking
D) adware
Correct Answer
verified
Multiple Choice
A) key logger
B) hardware key logger
C) cookie
D) adware
Correct Answer
verified
Multiple Choice
A) acceptable use policy
B) social media policy
C) information privacy policy
D) email privacy policy
Correct Answer
verified
Showing 81 - 100 of 331
Related Exams