Filters
Question type

Study Flashcards

What is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them?


A) Digital certificate
B) Encryptography
C) Decrypt
D) Cryptography

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of the above

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents?


A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a masquerading attack that combines spam with spoofing?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

A) True
B) False

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of the above

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.

A) True
B) False

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers,resolving customer issues,and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?


A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?


A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Cyberbullying
B) Cybervandalism
C) Cookie
D) All of the above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is adware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

A) True
B) False

Correct Answer

verifed

verified

If an organization implemented only one policy,which one would it want to implement?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Within the third area of detection and response,an __________ detection software features full-time monitoring tools that search for patterns in network traffic to identify intruders.

Correct Answer

verifed

verified

What is software written with malicious intent to cause annoyance or damage?


A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 101 - 120 of 344

Related Exams

Show Answer