Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looking through your trash to find personal information.
C) Legitimate users purposely or accidentally misusing their access to the environment and causing some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
Multiple Choice
A) Iris scan
B) Password
C) Fingerprint
D) Handwriting
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software
Correct Answer
verified
Multiple Choice
A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords
Correct Answer
verified
Multiple Choice
A) Voiceprint
B) Face
C) Iris
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
Multiple Choice
A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Showing 41 - 60 of 113
Related Exams