Filters
Question type

Study Flashcards

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

A) True
B) False

Correct Answer

verifed

verified

What type of Internet monitoring technique records information about a customer during a Web surfing session such as what websites were visited and how long the visit was,what ads were viewed and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is spyware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If an organization implemented only one policy,which one would it want to implement?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Single-factor authentication requires the user to provide two means of authentication,what the user knows (password)and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

What is digital rights management?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Web log
C) Adware
D) Hardware key logger

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a program,when installed on a computer,records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is single-factor authentication?


A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the definition of information secrecy?


A) The act of conforming,acquiescing,or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because,if one security level is broken,the attacker will still have to break through additional levels.

A) True
B) False

Correct Answer

verifed

verified

What decodes information?


A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following definitions represents opt-in?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Choosing to allow permission to incoming emails
D) Choosing to deny permission to incoming emails

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.

A) True
B) False

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of these choices

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 201 - 220 of 333

Related Exams

Show Answer