Filters
Question type

Study Flashcards

Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

What requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) ?


A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) biometrics

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following definitions represents Internet censorship?


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

Correct Answer

verifed

verified

Intrusion detection software (...

View Answer

Which of the following represents the two fundamental building blocks that protect organizational information?


A) security and sales
B) human resources and security
C) ethics and security
D) ethics and technology

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

Different organizations and countries have their own terms for fair information practices.Which of the following is correct?


A) The United Kingdom terms it "Data Protection."
B) The European Union terms it "Data Protection."
C) The United Kingdom terms it "Personal Data Privacy."
D) The United States terms it "Personal Data Privacy."

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

What is adware?


A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following changes its form as it propagates?


A) backdoor programs
B) strikers
C) polymorphic viruses and worms
D) splogs

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

What is pharming?


A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) voice
B) face
C) iris
D) All of these are considered biometrics.

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?


A) elevation of privilege
B) packet tampering
C) spoofing
D) spyware

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is cybervandalism?


A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal, and pharming is illegal.
B) Phishing is the right of the company, where pharming is the right of the individual.
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites.
D) All of these are correct.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The most secure procedures combine which of the following authentication and authorization techniques?


A) something the user knows, such as a user ID and password
B) something the user has, such as a smart card or token
C) something that is part of the user, such as a fingerprint or voice signature
D) All of these are correct.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Cyberbullying is an act or object that poses a danger to assets.

A) True
B) False

Correct Answer

verifed

verified

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) technology first, customers second
B) technology first, people second
C) innovation first, technology second
D) people first, technology second

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 161 - 180 of 331

Related Exams

Show Answer