Filters
Question type

Study Flashcards

Which of the below represents the biggest problem of information security breaches?


A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of the above

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

A) True
B) False

Correct Answer

verifed

verified

Through social ____________,hackers use their social skills to trick people into revealing access credentials or other valuable information.

Correct Answer

verifed

verified

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

Opt ________ of receiving emails by choosing to deny permission to incoming emails.

Correct Answer

verifed

verified

Which of the following is not an example of unplanned downtime?


A) Power outages
B) Tornados
C) A system upgrade
D) Network failure

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

All of the following are types of information security breaches except:


A) Insiders
B) E-Espionage
C) Dumpster diving
D) E-discovery

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

There are two means of stealing an identity,____________ reroutes requests for legitimate websites to false websites.

Correct Answer

verifed

verified

The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

Correct Answer

verifed

verified

A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.

A) True
B) False

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

A) True
B) False

Correct Answer

verifed

verified

A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

Website name _________ is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.

Correct Answer

verifed

verified

Which quadrant in the cost of downtime includes equipment rental,overtime costs,and travel expenses?


A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.

A) True
B) False

Correct Answer

verifed

verified

Showing 281 - 300 of 344

Related Exams

Show Answer