Filters
Question type

Study Flashcards

What is Simplelocker?


A) A form of malicious software that infects your computer and asks for money
B) A ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

B

A worm spreads itself not only from file to file but also from computer to computer.

A) True
B) False

Correct Answer

verifed

verified

A worm is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights,usually for the purpose of compromising or destroying the system?


A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Decrypt information is to decode it and is the opposite of encrypt.

A) True
B) False

Correct Answer

verifed

verified

Multifactor authentication is the traditional security process,which requires a username and password.

A) True
B) False

Correct Answer

verifed

verified

A certificate authority is a trusted third party,such as VeriSign,that validates user identities by means of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

A) True
B) False

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following definitions represents physical security?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) Tangible protection such as alarms,guards,fireproof doors,fences,and vaults
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) Choosing to deny permission to incoming emails

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

D

What is the electronic defacing of an existing website?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

True

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?


A) Cyberbulling
B) Fair information practices
C) Click-fraud
D) Bring your own device

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs,a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What is information secrecy?


A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the below should be included in a company email privacy policy?


A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of these choices

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following is one of the four basic options included in a bring your own device policy?


A) Unlimited access for personal devices
B) Access only to nonsensitive systems and data
C) Access,but preventing local storage of data on personal devices
D) All of these choices

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

Worms are computer viruses that wait for a specific date before executing their instructions.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 333

Related Exams

Show Answer