Filters
Question type

Study Flashcards

What is dumpster diving?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker that looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What decodes information?


A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?


A) Information ethics policy
B) Information security policy
C) Information technology plan
D) All of these

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The best and most effective way to manage authentication is through ________.


A) smart technology card
B) tokens
C) biometrics
D) passwords

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

A) True
B) False

Correct Answer

verifed

verified

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of these

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What area of information security focuses on preventing identity theft, phishing, and pharming scams?


A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is it called when a hacker looks through your trash to find personal information?


A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the biggest problem of information security breaches?


A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of these

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

What is a masquerading attack that combines spam with spoofing?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.

A) True
B) False

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information. He suspects that this may be caused by an internal employee. He needs to clarify and establish what type of plan to help reduce further problems?


A) An information security plan
B) An ethical information policy
C) An antivirus plan
D) None of these

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 113

Related Exams

Show Answer