Filters
Question type

Study Flashcards

A pharming attack uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack.

A) True
B) False

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense. The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the definition of information property?


A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

What is sock puppet marketing?


A) Any data that could potentially identify a specific individual.
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

Internet governance is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

A) True
B) False

Correct Answer

verifed

verified

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

A) True
B) False

Correct Answer

verifed

verified

What is sensitive PII?


A) .Any data that could potentially identify a specific individual
B) Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
C) Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
D) The use of a false identity to artificially stimulate demand for a product, brand, or service.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Standards of living
D) Security

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What is software written with malicious intent to cause annoyance or damage?


A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is ransomware?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

What is a hacker?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Phishing reroutes requests for legitimate websites to false websites.

A) True
B) False

Correct Answer

verifed

verified

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a threat?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

A) True
B) False

Correct Answer

verifed

verified

Showing 221 - 240 of 354

Related Exams

Show Answer