Filters
Question type

Study Flashcards

___________ attack computer systems by transmitting a virus hoax,with a real virus attached.

Correct Answer

verifed

verified

Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

What is a mail bomb?


A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.

A) True
B) False

Correct Answer

verifed

verified

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is included in the four quadrants of ethical and legal behavior?


A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it Janet is creating the potential for which type of information security breach to occur?


A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

What is information security?


A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Sniffer
B) Spyware
C) Spoofware
D) Splog

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username,password,and sometimes credit card information.

A) True
B) False

Correct Answer

verifed

verified

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.

Correct Answer

verifed

verified

Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Phishing reroutes requests for legitimate websites to false websites.

A) True
B) False

Correct Answer

verifed

verified

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network

A) True
B) False

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves,not just from file to file,but also from computer to computer?


A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Showing 121 - 140 of 344

Related Exams

Show Answer