Filters
Question type

Study Flashcards

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What can encryption technology perform?


A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of these choices

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?


A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information secrecy

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

A) True
B) False

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?


A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?


A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts a trusted third party to verify information.One of Charles' largest clients is CheckMd,which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMD?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is the difference between pirated and counterfeit software?


A) Counterfeit is fake technology products,where pirated is invisible technological cameras placed online.
B) Pirated is the unauthorized use,duplication,distribution,or sale of copyrighted software,where counterfeit is software that is manufactured to look like the real thing and sold as such.
C) Counterfeit is the unauthorized use,duplication,distribution,or sale of copyrighted software,where pirated is software that is manufactured to look like the real thing and sold as such.
D) Pirated is stolen software used to hack into a company's classified material,where counterfeit is a fake version of firewall software.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is a mail bomb?


A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What requires more than two means of authentication such as what the user knows (password) ,what the user has (security token) ,and what the user is (biometric verification) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

What is a technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

What is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is a masquerading attack that combines spam with spoofing?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

What is the traditional security process,which requires a username and password?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes workplace MIS monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these choices

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 81 - 100 of 333

Related Exams

Show Answer