Filters
Question type

Study Flashcards

Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Phishing
B) Authentication
C) Authorization
D) Programming

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?


A) Key logger
B) Hardware key logger
C) Cookie
D) Adware

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is pretexting?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What is an insider?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea,such as a song,book,or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following governs the ethical and moral issues arising from the development and use of information technologies,and the creation,collection,duplication,distribution,and processing of information?


A) Ethical information
B) Information technology
C) Information policies
D) Information ethics

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

A) True
B) False

Correct Answer

verifed

verified

Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.

A) True
B) False

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What is vishing?


A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

What refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is not an example of unplanned downtime?


A) Power outages
B) Tornados
C) A system upgrade
D) Network failure

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

A company should be able to calculate the cost of downtime by which of the following?


A) Per hour,per day,and per week
B) Per employee,per computer,and per company
C) Per stock,per stockholder,and per investment capital
D) None of these choices

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Single-factor authentication requires more than two means of authentication such as what the user knows (password),what the user has (security token),and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

Showing 221 - 240 of 333

Related Exams

Show Answer