Filters
Question type

Study Flashcards

A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.

A) True
B) False

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort,and he is faced with both physical and information security threats every month.Since the resort implemented a new software system,they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?


A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Backdoor programs open a way into the network for future attacks.

A) True
B) False

Correct Answer

verifed

verified

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?


A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following definitions represents Teergrubing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following definitions represents Website name stealing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how,when,and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.

Correct Answer

verifed

verified

What is phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Information _______________ examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

_______________ software is software that is manufactured to look like the real thing and sold as such.

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) Authentication and authorization,prevention and resistance,prevention and response
B) Authentication and authorization,prevention and response,detection and response
C) Analyzing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorization,prevention and resistance,detection and response

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What is drive-by hacking?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

___________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread,where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person,where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread,where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the above

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Showing 241 - 260 of 344

Related Exams

Show Answer