Filters
Question type

Study Flashcards

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

What are critical questions that managers should ask when determining the cost of downtime?


A) What is the productivity cost associated with each hour of downtime?
B) How many transactions can the company afford to lose without significantly harming business?
C) All of the above
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The protection of customers' privacy is one of the largest ethical issues for corporations today._____________ is the right to be left alone when you want to be,to have control over your personal possessions.

Correct Answer

verifed

verified

What can encryption technology perform?


A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

D

Which act strengthened criminal laws against identity theft?


A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

What are experts in technology who use their knowledge to break into computers and networks,for profit or just as a challenge known as?


A) Elevation of privilege
B) Virus
C) Hacker
D) Worm

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

A) True
B) False

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is the Child Online Protection Act?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Using ones social skills to trick people into revealing access credentials or other valuable information is called ______________.


A) Social engineering
B) Social media
C) Social viruses
D) Social processes

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

A) True
B) False

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Phishing
B) Authentication
C) Authorization
D) Programming

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.

Correct Answer

verifed

verified

Program

Cyberbullying is an act or object that poses a danger to assets.

A) True
B) False

Correct Answer

verifed

verified

Digital _______ management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

Correct Answer

verifed

verified

What is a hacker?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

_____________ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Correct Answer

verifed

verified

Typosquatting

Showing 1 - 20 of 344

Related Exams

Show Answer