Filters
Question type

Study Flashcards

What is software written with malicious intent to cause annoyance or damage?


A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

The three primary information security areas are 1)authentication and authorization,2)policies and rewards,and 3)detection and response.

A) True
B) False

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames,passwords,personal information,and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names.This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is a ransomware program that encrypts your personal files and demands payment for the files' decryption keys?


A) Sniffer
B) Spyware
C) Spoofware
D) Simplelocker

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.

A) True
B) False

Correct Answer

verifed

verified

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

What passed to protect minors from accessing inappropriate material on the Internet?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent,detect,and remove known viruses,adware,and spyware?


A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.

A) True
B) False

Correct Answer

verifed

verified

Social media can be a very valuable tool for a company if used properly.Which of the following represents social media uses for a company?


A) Building a strong brand identity
B) Protecting the company reputation through counter-damage control
C) Engaging directly with customers and prospective customers
D) All of these choices

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Using ones social skills to trick people into revealing access credentials or other valuable information is called ______________.


A) social engineering
B) social media
C) social viruses
D) social processes

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of these choices

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy,use,and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these choices offers an example of acting ethically.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Single-factor authentication is the traditional security process,which requires a username and password.

A) True
B) False

Correct Answer

verifed

verified

The best and most effective way to manage authentication is through ___________.


A) smart technology card
B) tokens
C) biometrics
D) passwords

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

A) True
B) False

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?


A) Backdoor programs
B) Drive-by Hacking
C) Polymorphic viruses and worms
D) Hacker

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 241 - 260 of 333

Related Exams

Show Answer