Filters
Question type

Study Flashcards

What is software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

A) True
B) False

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.

A) True
B) False

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues.For example,imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course,this email is not actually from eBay and as soon as you log in your information will be stolen.What type of information security breach would you consider this to be?


A) An insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false website?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

In the information technology world,which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these choices

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Fair information practices are policies that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?


A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Ransomware is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

Backdoor programs change their form as they propagate.

A) True
B) False

Correct Answer

verifed

verified

A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.These characteristics,which are based on the physical configuration of a speaker's mouth and throat,can be expressed as a mathematical formula.Unfortunately,biometric authentication such as voiceprints can be costly and intrusive.

A) True
B) False

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Information bullying
B) Cybervandalism
C) Cookie
D) BYOD

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following definitions represents typosquatting?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is ransomware?


A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

Social media monitoring is the process of monitoring and responding to what is being said about a company,individual,product,or brand.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not considered an epolicy?


A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
D) Anti-hacker use policy

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is the process of monitoring and responding to what is being said about a company,individual,product,or brand?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Anti-spam policy

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or an information inquiry?


A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

A zombie farm is a group of computers on which a hacker has planted zombie programs.

A) True
B) False

Correct Answer

verifed

verified

Showing 261 - 280 of 333

Related Exams

Show Answer