A) Packet tampering,worms,cakes,and Trojan viruses
B) Polymorphic,sniffer,splogs,and Denial-of-service viruses
C) Backdoor program,worm,Trojan-horse viruses
D) All of the above
Correct Answer
verified
Multiple Choice
A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver
Correct Answer
verified
Multiple Choice
A) Something the user knows,such as a user ID and password
B) Something the user has,such as a smart card or token
C) Something that is part of the user,such as a fingerprint or voice signature
D) All of the above
Correct Answer
verified
Multiple Choice
A) Information systems policy
B) Epolicies
C) Technology applied policy
D) Emastery
Correct Answer
verified
Multiple Choice
A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Drive-by Hacking
C) Polymorphic viruses and worms
D) Hacker
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
Multiple Choice
A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring
Correct Answer
verified
Multiple Choice
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of the above
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware
Correct Answer
verified
Multiple Choice
A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
Showing 301 - 320 of 344
Related Exams