Filters
Question type

Study Flashcards

Which of the following are all common forms of viruses?


A) Packet tampering,worms,cakes,and Trojan viruses
B) Polymorphic,sniffer,splogs,and Denial-of-service viruses
C) Backdoor program,worm,Trojan-horse viruses
D) All of the above

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is digital rights management?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Script-kiddies have criminal intent when hacking.

A) True
B) False

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames,passwords,personal information,and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names.This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

The most secure procedures combine which of the following authentication and authorization techniques?


A) Something the user knows,such as a user ID and password
B) Something the user has,such as a smart card or token
C) Something that is part of the user,such as a fingerprint or voice signature
D) All of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?


A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In relation to privacy,which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?


A) Backdoor programs
B) Drive-by Hacking
C) Polymorphic viruses and worms
D) Hacker

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

What is a threat?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

With so much information and moving parts within a company,technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employee's activities by measures as keystrokes,error rate,and number of transaction processed?


A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following represents the two fundamental building blocks that protect organizational information?


A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Crackers,cyberterrorists,hactivists,and script bunnies are all types of __________.

Correct Answer

verifed

verified

What scrambles information into an alternative form that requires a key or password to decrypt?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights,usually for the purpose of compromising or destroying the system?


A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A DDoS stands for one of the common forms of viruses,that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?


A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Identity theft is the forging of someone's identity for the purpose of fraud.

A) True
B) False

Correct Answer

verifed

verified

__________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

Correct Answer

verifed

verified

Included in the information security policy,managers should consider including virus protection,which includes how often the system should be scanned and how frequently the software should be __________.

Correct Answer

verifed

verified

What is pharming?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Showing 301 - 320 of 344

Related Exams

Show Answer