Filters
Question type

Study Flashcards

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) Authentication and authorization,prevention and resistance,prevention and response
B) Authentication and authorization,prevention and response,detection and response
C) Analyzing and authenticating,prevention and repositioning,detection and response
D) Authentication and authorization,prevention and resistance,detection and response

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?


A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Cyberbullying is a person within the organization who is trusted to monitor,contribute,filter,and guide the social media presence of a company,individual,product,or brand.

A) True
B) False

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of these choices

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is included in the four quadrants of ethical and legal behavior?


A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of these choices

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves,not just from file to file,but also from computer to computer?


A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following represents the two fundamental building blocks that protect organizational information?


A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Who is a person within the organization who is trusted to monitor,contribute,filter,and guide the social media presence of a company,individual,product,or brand?


A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbulling
B) Information vandalism
C) Cookie
D) BYOD

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is not considered a form of biometrics?


A) Iris scan
B) Password
C) Fingerprint
D) Handwriting

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following definitions represents teergrubing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Through pretexting,hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Who are experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge?


A) Information spy
B) Hacker
C) Spyware
D) Adware

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of these choices

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is multifactor authentication?


A) The traditional security process,which requires a username and password
B) Requires the user to provide two means of authentication,what the user knows (password) and what the user has (security token)
C) Requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification)
D) The identification of a user based on physical characteristic such as a fingerprint,iris,face,voice or handwriting

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 333

Related Exams

Show Answer