Filters
Question type

Study Flashcards

Organizations address security risks through two lines of defense.The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is a common Internet monitoring technology?


A) Key logger
B) Hardware key logger
C) Cookie
D) All of these choices

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) Spyware
B) Spam
C) Adware
D) None of these choices

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is two-factor authentication?


A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

A) True
B) False

Correct Answer

verifed

verified

What refers to denying permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

A) True
B) False

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is a form of malicious software that infects your computer and asks for money?


A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is served as key evidence in many legal cases today and also provides a faster,easier way to search and organize paper documents?


A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between _____ and ________.


A) legal & confidential
B) legal & ethical
C) legal & technical
D) confidential & open

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it Janet is creating the potential for which type of information security breach to occur?


A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of these choices

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What refers to choosing to allow permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.

A) True
B) False

Correct Answer

verifed

verified

A user can opt in of receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

A) True
B) False

Correct Answer

verifed

verified

An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.

A) True
B) False

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys,one for public and one for private?


A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code
This is the definition of a PKE.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Anti-spam policy

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 281 - 300 of 333

Related Exams

Show Answer