A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker that looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Information ethics policy
B) Information security policy
C) Information technology plan
D) All of these
Correct Answer
verified
Multiple Choice
A) smart technology card
B) tokens
C) biometrics
D) passwords
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Smart card
B) Token
C) Biometrics
D) Content filtering
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of these
Correct Answer
verified
Multiple Choice
A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization
Correct Answer
verified
Multiple Choice
A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals
Correct Answer
verified
Multiple Choice
A) Voice
B) Face
C) Iris
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An information security plan
B) An ethical information policy
C) An antivirus plan
D) None of these
Correct Answer
verified
Showing 41 - 60 of 113
Related Exams