Filters
Question type

Study Flashcards

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

What is dumpster diving?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looking through your trash to find personal information.
C) Legitimate users purposely or accidentally misusing their access to the environment and causing some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not considered a form of biometrics?


A) Iris scan
B) Password
C) Fingerprint
D) Handwriting

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?


A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

The best and most effective way to manage authentication is through ___________.


A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?


A) Voiceprint
B) Face
C) Iris
D) All of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of these

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

Phishing reroutes requests for legitimate websites to false websites.

A) True
B) False

Correct Answer

verifed

verified

Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

A phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username, password, and sometimes credit card information.

A) True
B) False

Correct Answer

verifed

verified

Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

A) True
B) False

Correct Answer

verifed

verified

What is single-factor authentication?


A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?


A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is pretexting?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 41 - 60 of 113

Related Exams

Show Answer