Filters
Question type

Study Flashcards

A phishing expedition is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter his or her username, password, and sometimes credit card information.

A) True
B) False

Correct Answer

verifed

verified

What requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

A) True
B) False

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

Correct Answer

verifed

verified

Authentication and Authorization: Authen...

View Answer

What uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) Technology first, customers second
B) Technology first, people second
C) Innovation first, technology second
D) People first, technology second

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a digital camera on eBay. Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information. Of course, this email is not actually from eBay and as soon as you log in your information will be stolen. What type of information security breach would you consider this to be?


A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?


A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

A) True
B) False

Correct Answer

verifed

verified

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false website?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

A) True
B) False

Correct Answer

verifed

verified

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of?


A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is a phishing expedition?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 113

Related Exams

Show Answer