Correct Answer
verified
Multiple Choice
A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
Multiple Choice
A) Smart card
B) Token
C) Biometrics
D) Content filtering
Correct Answer
verified
Multiple Choice
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
Multiple Choice
A) Be as specific as possible stating when and what will be monitored
B) Do not state the consequences of violating the policy
C) Always enforce the policy the same for everyone
D) Expressly communicate that the company reserves the right to monitor all employees
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Token
B) Password
C) Smart card
D) Biometrics
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Authentication and authorization,prevention and resistance,prevention and response
B) Authentication and authorization,prevention and response,detection and response
C) Analyzing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorization,prevention and resistance,detection and response
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread,where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person,where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread,where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the above
Correct Answer
verified
Showing 241 - 260 of 344
Related Exams