Filters
Question type

Study Flashcards

Which of the following definitions represents Typosquatting?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of the following definitions represents Teergrubing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.

A) True
B) False

Correct Answer

verifed

verified

What is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

A) True
B) False

Correct Answer

verifed

verified

The most secure procedures combine which of the following authentication and authorization techniques?


A) Something the user knows,such as a user ID and password
B) Something the user has,such as a smart card or token
C) Something that is part of the user,such as a fingerprint or voice signature
D) All of the above

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.

A) True
B) False

Correct Answer

verifed

verified

Information security ___________ identify the rules required to maintain information security,such as requiring users to log off before leaving for lunch or meetings,never sharing passwords with anyone,and changing passwords every thirty days.

Correct Answer

verifed

verified

The protection of customers' privacy is one of the largest ethical issues for corporations today._____________ is the right to be left alone when you want to be,to have control over your personal possessions.

Correct Answer

verifed

verified

An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.

A) True
B) False

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Sniffer
B) Spyware
C) Spoofware
D) Splog

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A certificate authority is a trusted third party,such as VeriSign,that validates user identities by means of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

The _________ of Information Act allows any person to examine government records unless it would cause an invasion of privacy.

Correct Answer

verifed

verified

Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

A) True
B) False

Correct Answer

verifed

verified

Which of the following means the right to be left alone when you want to be,to have control over your personal possessions,and not to be observed without your consent?


A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What are critical questions that managers should ask when determining the cost of downtime?


A) What is the productivity cost associated with each hour of downtime?
B) How many transactions can the company afford to lose without significantly harming business?
C) All of the above
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 342

Related Exams

Show Answer