Filters
Question type

Study Flashcards

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is an insider?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looking through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response.

Correct Answer

verifed

verified

(1) Authentication and authorization: Au...

View Answer

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is multifactor authentication?


A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.

A) True
B) False

Correct Answer

verifed

verified

What scrambles information into an alternative form that requires a key or password to decrypt?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A pharming attack uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.

A) True
B) False

Correct Answer

verifed

verified

What requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues.For example, imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course, this email is not actually from eBay and as soon as you log in your information will be stolen.What type of information security breach would you consider this to be?


A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Showing 101 - 113 of 113

Related Exams

Show Answer