Filters
Question type

Study Flashcards

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) Authentication and authorization, prevention and resistance, prevention and response
B) Authentication and authorization, prevention and response, detection and response
C) Analyzing and authenticating, prevention and repositioning, detection and response
D) Authentication and authorization, prevention and resistance, detection and response

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

There are three areas where technology can aid in the defense against attacks.The first area, which is at the people level, includes authentication and _____________________.

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The six epolicies organizations should implement include ethical computer use policy, information privacy policy, acceptable use policy, email privacy policy, __________ media policy, and workplace monitoring policy.

Correct Answer

verifed

verified

Which of the following changes its form as it propagates?


A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

An acceptable use policy (AUP) requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

A) True
B) False

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

The _________ of Information Act allows any person to examine government records unless it would cause an invasion of privacy.

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense.The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company-owned software
B) Employees searching other employees' private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the following

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following are all common forms of viruses?


A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of these

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?


A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

Correct Answer

verifed

verified

A(n) _______ is a program or device that can monitor data traveling over a network.

Correct Answer

verifed

verified

The ____ of death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time, overloading it and shutting it down.

Correct Answer

verifed

verified

Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.

A) True
B) False

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a common Internet monitoring technology?


A) Key logger
B) Hardware key logger
C) Cookie
D) All of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following policies details the extent to which email messages may be read by others?


A) Email privacy policy
B) Email confidential policy
C) Anti-spam policy
D) Spam policy

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 121 - 140 of 225

Related Exams

Show Answer