Filters
Question type

Study Flashcards

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

___________ is a method for confirming users' identities.

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

_________ seeks to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

Correct Answer

verifed

verified

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

An information security ___________ details how an organization will implement the information security policies.

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues.For example,imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course,this email is not actually from eBay and as soon as you log in your information will be stolen.What type of information security breach would you consider this to be?


A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What occurs when a person chooses to deny permission to incoming emails?


A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Worms are computer viruses that wait for a specific date before executing their instructions.

A) True
B) False

Correct Answer

verifed

verified

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.

A) True
B) False

Correct Answer

verifed

verified

A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.

Correct Answer

verifed

verified

What are computer viruses that wait for a specific date before executing their instructions?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The six epolicies organizations should implement include,ethical computer use policy,information privacy policy,acceptable use policy,email privacy policy,__________ media policy,and workplace monitoring policy.

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company.Her boss,Mike Jones,is responsible for developing a new software game for the Wii.After completion of the project Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.


A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

A) True
B) False

Correct Answer

verifed

verified

What is a phishing expedition?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

There are three areas where technology can aid in the defense against attacks.Area one which is at the people level includes authentication and _____________________.

Correct Answer

verifed

verified

What decodes information?


A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 141 - 160 of 344

Related Exams

Show Answer