Filters
Question type

Study Flashcards

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following describes confidentiality?


A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) The principles and standards that guide our behaviour toward other people

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is the recommended way to implement information security lines of defence?


A) People first, technology second
B) Technology first, people second
C) None of the above
D) All of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwordsally.

A) True
B) False

Correct Answer

verifed

verified

What is the unauthorized use,duplication,distribution,or sale of copyrighted software?


A) Fair Use Doctrine
B) Pirated software
C) Counterfeit software
D) Privacy

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

To facilitate information privacy,many countries have abolished legislation to protect the collection and sharing of personal information.

A) True
B) False

Correct Answer

verifed

verified

Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

What is spam?


A) A type of encryption
B) A type of content filtering
C) A form of unsolicited e-mail
D) None of the above

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which policy details the extent to which e-mail messages may be read by others?


A) Acceptable use policy
B) E-mail privacy policy
C) Internet use policy
D) None of the above

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

_______________ is a hacker with criminal intent.

Correct Answer

verifed

verified

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

Correct Answer

verifed

verified

What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?


A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?


A) Ethics
B) ePolicies
C) All of the above
D) None of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A(n)_______ is a program or device that can monitor data traveling over a network.

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of the above

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?


A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Showing 61 - 80 of 171

Related Exams

Show Answer