Filters
Question type

Study Flashcards

Which of the following is not considered a form of biometrics?


A) Iris scan
B) Password
C) Fingerprint
D) Handwriting

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

___________ refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.

Correct Answer

verifed

verified

In the information technology world,which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the above

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A zombie farm is a group of computers on which a hacker has planted zombie programs.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not considered an epolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Pirated software is software that is manufactured to look like the real thing and sold as such.

A) True
B) False

Correct Answer

verifed

verified

Information ___________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy,use,and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above offers an example of acting ethically

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.

A) True
B) False

Correct Answer

verifed

verified

Which of the following changes its form as it propagates?


A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which company policy did Visa create the program 'Innovant' to handle?


A) Information governance
B) Information privacy policy
C) Ethical computer use policy
D) Acceptable use policy

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense.The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

What is an act or object that poses a danger to assets?


A) Cyberbullying
B) Threat
C) Click-fraud
D) Competitive click-fraud

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.

Correct Answer

verifed

verified

____________ are the principles and standards that guide our behavior toward other people.

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 344

Related Exams

Show Answer