Filters
Question type

Study Flashcards

Which act restricts what information the federal government can collect?


A) Privacy act
B) Bork Bill
C) Freedom of Information Act
D) Communications Assistance for Law Enforcement Act

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is the unauthorized use,duplication,distribution,or sale of copyrighted software?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is an act or object that poses a danger to assets?


A) Cyberbulling
B) Threat
C) Click-fraud
D) Competitive click-fraud

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

A) True
B) False

Correct Answer

verifed

verified

What area of information security focuses on preventing identity theft,phishing,and pharming scams?


A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The _________ act restricts what information the federal government can collect.

Correct Answer

verifed

verified

What is a masquerading attack that combines spam with spoofing?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

A) True
B) False

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense.The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

A) True
B) False

Correct Answer

verifed

verified

Which of the below is not one of the six epolicies that a company should implement for information protection as discussed in the text?


A) Information privacy policy
B) Workplace monitoring policy
C) Acceptable use policy
D) Downtime monitoring policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

A) True
B) False

Correct Answer

verifed

verified

What is digital rights management?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software.
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The most common type of defense within detection and response technologies is _________ software.

Correct Answer

verifed

verified

Antivirus ...

View Answer

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

A) True
B) False

Correct Answer

verifed

verified

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of the above

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 101 - 120 of 342

Related Exams

Show Answer