A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network
Correct Answer
verified
Multiple Choice
A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of the above
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Iris scan
B) Password
C) Fingerprint
D) Handwriting
Correct Answer
verified
Multiple Choice
A) The unauthorized use,duplication,distribution,or sale of copyrighted software.
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Authentication and authorization,prevention and resistance,prevention and response
B) Authentication and authorization,prevention and response,detection and response
C) Analyzing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorization,prevention and resistance,detection and response
Correct Answer
verified
Showing 281 - 300 of 342
Related Exams