Filters
Question type

Study Flashcards

A certificate authority is a trusted third party,such as VeriSign,that validates user identities by means of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys,one for public and one for private?


A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.

A) True
B) False

Correct Answer

verifed

verified

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

When studying the figure of the four quadrants of ethical and legal behavior,the goal is for organizations to make decisions in which of the following quadrants?


A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the below would you find in a typical Internet use policy?


A) User ramifications if the policy is violated
B) User responsibility for properly handling offensive material
C) User responsibility for protecting the company's good name
D) All of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which act restricts what information the federal government can collect?


A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following definitions represents physical security?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) Tangible protection such as alarms,guards,fireproof doors,fences,and vaults
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) Choosing to deny permission to incoming emails.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

A) True
B) False

Correct Answer

verifed

verified

What is Cybervandalism?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

_______________ includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.

Correct Answer

verifed

verified

What passed to protect minors from accessing inappropriate material on the Internet?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

A) True
B) False

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs,a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

A) True
B) False

Correct Answer

verifed

verified

The best and most effective way to manage authentication is through ___________.


A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.

A) True
B) False

Correct Answer

verifed

verified

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

Showing 201 - 220 of 344

Related Exams

Show Answer