Filters
Question type

Study Flashcards

What is an act or object that poses a danger to assets?


A) cyberbullying
B) threat
C) click-fraud
D) competitive click-fraud

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) contentment
B) ethical standard
C) confidentiality
D) firewall security

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decode?


A) encryption
B) content filtering
C) firewalls
D) antivirus software

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?


A) an information privacy policy
B) an email privacy policy
C) an Internet use policy
D) a workplace monitoring policy

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) virus
B) white-hat hackers
C) dumpster diving
D) All of these are correct.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What is pretexting?


A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

A) True
B) False

Correct Answer

verifed

verified

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?


A) pharming
B) phishing
C) phishing expedition
D) spear phishing

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

A) True
B) False

Correct Answer

verifed

verified

What is pirated software?


A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following choices is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) information privacy policy
B) workplace monitoring policy
C) acceptable use policy
D) downtime monitoring policy

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?


A) dumpster texting
B) dumpster diving
C) trash retrieval
D) pretexting

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is it called when government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?


A) typosquatting
B) website name stealing
C) Internet censorship
D) teergrubing

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the choices below represents the definition of information property?


A) an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) spyware
B) web log
C) adware
D) hardware key logger

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is competitive click-fraud?


A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

A) True
B) False

Correct Answer

verifed

verified

Pirated software is software that is manufactured to look like the real thing and sold as such.

A) True
B) False

Correct Answer

verifed

verified

What is spyware?


A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Showing 101 - 120 of 331

Related Exams

Show Answer