Filters
Question type

Study Flashcards

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

_______________ software is software that is manufactured to look like the real thing and sold as such.

Correct Answer

verifed

verified

Worms are computer viruses that wait for a specific date before executing their instructions.

A) True
B) False

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs,a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

There are three areas where technology can aid in the defense against attacks.Area one which is at the people level includes authentication and _____________________.

Correct Answer

verifed

verified

The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.

Correct Answer

verifed

verified

What is click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

To find out your company policy regarding such websites as YouTube,Facebook,and Twitter you would have to refer to the ____________ policy.


A) Internet use
B) Social media
C) Information use
D) Employee monitoring

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 221 - 240 of 342

Related Exams

Show Answer