Filters
Question type

Study Flashcards

A distributed denial-of-service attack (DDoS) attacks from multiple __________ and floods a website with so many requests for service that it slows down or crashes.

Correct Answer

verifed

verified

Trust among companies, customers, partners, and suppliers is the support structure of which of the following?


A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies

E) All of the above
F) None of the above

Correct Answer

verifed

verified

The __________ Communications Privacy Act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

Correct Answer

verifed

verified

The _________ Act restricts what information the federal government can collect.

Correct Answer

verifed

verified

Janet is a financial aid counselor at a local community college, and she shares an office with her three co-workers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it, Janet is creating the potential for which type of information security breach to occur?


A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of these

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

The most common type of defense within detection and response technologies is _________ software.

Correct Answer

verifed

verified

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?


A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is one of the major problems with email?


A) Intellectual property
B) Nonrepudiation
C) User's expectation of privacy
D) None of these

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

A smart card is a device, the size of a credit card, that contains embedded technology that stores information and small amounts of software and can act as __________________.


A) Identification instruments
B) A form of digital cash
C) A data storage device
D) All of these

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following describes information technology monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?


A) Pharming
B) Authentication
C) Authorization
D) Programming

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

Correct Answer

verifed

verified

_______________ is a hacker with criminal intent.

Correct Answer

verifed

verified

As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution, ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) Spyware
B) Spam
C) Adware
D) None of these

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

The best and most effective way to manage authentication is through ___________.


A) Smart technology cards
B) Tokens
C) Biometrics
D) Passwords

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

Showing 161 - 180 of 225

Related Exams

Show Answer