Filters
Question type

Study Flashcards

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is a phishing expedition?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Script-kiddies have criminal intent when hacking.

A) True
B) False

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

Correct Answer

verifed

verified

The unauthorized use,duplication,distribution,or sale of copyrighted software is called ____________ software.

Correct Answer

verifed

verified

Which of the below would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Which of the below should be included in a company email privacy policy?


A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of the above

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The six epolicies organizations should implement include,ethical computer use policy,information privacy policy,acceptable use policy,email privacy policy,__________ media policy,and workplace monitoring policy.

Correct Answer

verifed

verified

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of the above

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is not considered a form of biometrics?


A) Iris scan
B) Password
C) Fingerprint
D) Handwriting

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is pirated software?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software.
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Information ____________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false website?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company.Her boss,Mike Jones,is responsible for developing a new software game for the Wii.After completion of the project Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.


A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) Authentication and authorization,prevention and resistance,prevention and response
B) Authentication and authorization,prevention and response,detection and response
C) Analyzing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorization,prevention and resistance,detection and response

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Showing 281 - 300 of 342

Related Exams

Show Answer