Correct Answer
verified
Multiple Choice
A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) biometrics
Correct Answer
verified
Multiple Choice
A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) security and sales
B) human resources and security
C) ethics and security
D) ethics and technology
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The United Kingdom terms it "Data Protection."
B) The European Union terms it "Data Protection."
C) The United Kingdom terms it "Personal Data Privacy."
D) The United States terms it "Personal Data Privacy."
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
Multiple Choice
A) backdoor programs
B) strikers
C) polymorphic viruses and worms
D) splogs
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information
Correct Answer
verified
Multiple Choice
A) voice
B) face
C) iris
D) All of these are considered biometrics.
Correct Answer
verified
Multiple Choice
A) elevation of privilege
B) packet tampering
C) spoofing
D) spyware
Correct Answer
verified
Multiple Choice
A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets
Correct Answer
verified
Multiple Choice
A) Phishing is not illegal, and pharming is illegal.
B) Phishing is the right of the company, where pharming is the right of the individual.
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites.
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) something the user knows, such as a user ID and password
B) something the user has, such as a smart card or token
C) something that is part of the user, such as a fingerprint or voice signature
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) technology first, customers second
B) technology first, people second
C) innovation first, technology second
D) people first, technology second
Correct Answer
verified
Showing 161 - 180 of 331
Related Exams