Filters
Question type

Study Flashcards

Which of the following are all common forms of viruses?


A) Packet tampering,worms,cakes,and Trojan viruses
B) Polymorphic,sniffer,splogs,and denial-of-service viruses
C) Backdoor program,worm,Trojan-horse viruses
D) All of these choices

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Bring your own device (BYOD)is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

What is spyware?


A) A form of malicious software that infects your computer and asks for money
B) A ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

An ethical computer use policy contains ...

View Answer

To find out your company policy regarding such websites as YouTube,Facebook,and Twitter you would have to refer to the ____________ policy.


A) Internet use
B) social media
C) information use
D) employee monitoring

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What scrambles information into an alternative form that requires a key or password to decrypt?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What includes a variety of threats such as viruses,worms,and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.

A) True
B) False

Correct Answer

verifed

verified

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A user can opt in to receive emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat,cracker,cyberterrorist,hactivist,script kiddies,and white-hat hackers
B) Black-top,cookie,script kids,environment,Web 3.0,and white-top hackers
C) Black-hat,script kiddies,script bats,spider crawlers,Ad spiders,and white-hat hackers
D) None of these choices

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A social media policy outlines the corporate guidelines or principles governing employee online communications.

A) True
B) False

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Sniffer
B) Spyware
C) Spoofware
D) Splog

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.


A) informed; collaborate
B) consent; informed
C) informed; consent
D) consent; information

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) A combination of all of these choices

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the below defines information security?


A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of these choices

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

Showing 141 - 160 of 333

Related Exams

Show Answer