Filters
Question type

Study Flashcards

If an organization implemented only one policy,which one would it want to implement?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of the above

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread,where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person,where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread,where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the above

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Phishing reroutes requests for legitimate websites to false websites.

A) True
B) False

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights,usually for the purpose of compromising or destroying the system?


A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?


A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is a threat?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

A) True
B) False

Correct Answer

verifed

verified

Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?


A) Key logger
B) Hardware key logger
C) Cookie
D) Adware

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

What are experts in technology who use their knowledge to break into computers and networks,for profit or just as a challenge known as?


A) Elevation of privilege
B) Virus
C) Hacker
D) Worm

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) Splog
B) Adware
C) Spygloss
D) CPU buzzer

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is Cybervandalism?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat,cracker,cyberterrorist,hactivist,script kiddies,and white-hat hackers
B) Black-top,cookie,script kids,environment,Web 3.0,and white-top hackers
C) Black-hat,script kiddies,script bats,spider crawlers,Ad spiders,and white-hat hackers
D) None of the above

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is not considered an epolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A __________ is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.

Correct Answer

verifed

verified

Showing 41 - 60 of 342

Related Exams

Show Answer