Correct Answer
verified
Multiple Choice
A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) An act or object that poses a danger to assets
Correct Answer
verified
Multiple Choice
A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network
Correct Answer
verified
Multiple Choice
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Multiple Choice
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Content filtering,encryption,and firewalls
B) Calculating,locking,and firewalls
C) Content prohibiting,and cookies
D) None of these choices
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant
Correct Answer
verified
Multiple Choice
A) Voice
B) Face
C) Iris
D) All of these choices
Correct Answer
verified
Showing 161 - 180 of 333
Related Exams