Filters
Question type

Study Flashcards

What area of information security focuses on preventing identity theft,phishing,and pharming scams?


A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.

A) True
B) False

Correct Answer

verifed

verified

Information compliance is the act of conforming,acquiescing,or yielding information.

A) True
B) False

Correct Answer

verifed

verified

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread,where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person,where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread,where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of these choices

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the below is not included as a common stipulation an organization would follow when creating an employee monitoring policy?


A) Be as specific as possible stating when and what will be monitored.
B) Do not state the consequences of violating the policy.
C) Always enforce the policy the same for everyone.
D) Expressly communicate that the company reserves the right to monitor all employees.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content,such as email,to prevent the accidental or malicious transmission of unauthorized information?


A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.

A) True
B) False

Correct Answer

verifed

verified

What is a phishing expedition?


A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents?


A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Identity theft is the forging of someone's identity for the purpose of fraud.

A) True
B) False

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 333

Related Exams

Show Answer