Filters
Question type

Study Flashcards

What is click-fraud?


A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What is one of the guidelines an organization can follow when creating an information privacy policy?


A) adoption and implementation of an anti-spam policy
B) notice and disclosure
C) choice and quality
D) None of these are correct.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) zombie
B) zombie farm
C) pharming attack
D) time bomb

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?


A) firewall
B) digital certificate
C) virus software
D) antivirus software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.

A) True
B) False

Correct Answer

verifed

verified

A worm spreads itself, not only from file to file, but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spreaD.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

A) True
B) False

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) a nonrepudiation clause
B) a repudiation clause
C) a confidentiality clause
D) an employee use clause

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs's top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) cracker
B) white-hat hacker
C) script bunnies
D) black-hat hacker

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) phone number
B) social Security number
C) address
D) driver's license number

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the choices below represents the definition of information compliance?


A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?


A) typosquatting
B) website name stealing
C) internet censorship
D) teergrubing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following definitions represents typosquatting?


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is one of the four basic options included in a bring your own device policy?


A) unlimited access for personal devices.
B) access only to nonsensitive systems and datA.
C) access, but preventing local storage of data on personal devices.
D) All of these are correct.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it Janet is creating the potential for which type of information security breach to occur?


A) insiders to hack into the college system
B) dumpster diving to find usernames and passwords
C) viruses and worms to spread through the college system
D) All of these are correct.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following refers to a period of time when a system is unavailable?


A) downtime
B) MIS down
C) direct data loss
D) downtown

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

What is the difference between pirated and counterfeit software?


A) Counterfeit is fake technology products, where pirated is invisible technological cameras placed online.
B) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such.
C) Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software, where pirated is software that is manufactured to look like the real thing and sold as such.
D) Pirated is stolen software used to hack into a company's classified material, where counterfeit is a fake version of firewall software.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What area of information security focuses on preventing identity theft, phishing, and pharming scams?


A) prevention and resistance
B) detection and authorizing
C) detection and response
D) authentication and authorization

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is not an example of unplanned downtime?


A) power outages
B) tornados
C) a system upgrade
D) network failure

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) content filtering, encryption, and firewalls
B) calculating, locking, and firewalls
C) content prohibiting, and cookies
D) None of these are correct.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 331

Related Exams

Show Answer