Filters
Question type

Study Flashcards

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) Content filtering, encryption, and firewalls
B) Calculating, locking, and firewalls
C) Content prohibiting, and cookies
D) None of the above

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What is a bug bounty program?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Anti-spam policy

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is information security?


A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the below would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What is the use of a false identity to artificially stimulate demand for a product, brand, or service?


A) Personally identifiable information (PII)
B) Nonsensitive PII
C) Sensitive PII
D) Sock puppet marketing

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success. What type of authentication technique is VeriSign providing for CheckMD?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A social media manager is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.

A) True
B) False

Correct Answer

verifed

verified

Which of the following changes its form as it propagates?


A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?


A) Voiceprint
B) Face
C) Iris
D) All of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Pirated software is software that is manufactured to look like the real thing and sold as such.

A) True
B) False

Correct Answer

verifed

verified

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the below represents the definition of information governance?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is not an example of unplanned downtime?


A) Power outages
B) Tornados
C) A system upgrade
D) Network failure

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What area of information security focuses on preventing identity theft, phishing, and pharming scams?


A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Showing 261 - 280 of 354

Related Exams

Show Answer