Filters
Question type

Study Flashcards

Which of the below would you find in a typical Internet use policy?


A) User ramifications if the policy is violated
B) User responsibility for properly handling offensive material
C) User responsibility for protecting the company's good name
D) All of these choices

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

What is a hacker?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?


A) Voiceprint
B) Face
C) Iris
D) All of these choices

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is pharming?


A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) Adoption and implementation of an anti-spam policy
B) Notice and disclosure
C) Choice and quality
D) None of these choices

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the below represents the definition of information governance?


A) The act of conforming,acquiescing,or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) Technology first,customers second
B) Technology first,people second
C) Innovation first,technology second
D) People first,technology second

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming,acquiescing,or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What are experts in technology who use their knowledge to break into computers and networks,for profit or just as a challenge known as?


A) Elevation of privilege
B) Virus
C) Hacker
D) Worm

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What occurs when a person chooses to deny permission to incoming emails?


A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

What requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the below represents the definition of information property?


A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) Examines the organizational resource of information and regulates its definitions,uses,values,and distribution,ensuring that it has the types of data/information required to function and grow effectively

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Bring your own device (BYOD)is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 333

Related Exams

Show Answer