Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
Multiple Choice
A) Technology first, customers second
B) Technology first, people second
C) Innovation first, technology second
D) People first, technology second
Correct Answer
verified
Multiple Choice
A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing
Correct Answer
verified
Multiple Choice
A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Showing 21 - 40 of 113
Related Exams