Filters
Question type

Study Flashcards

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

A) True
B) False

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is competitive click-fraud?


A) The electronic defacing of an existing website
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) An act or object that poses a danger to assets

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the below would not be found in a typical acceptable use policy?


A) Not using the service as part of violating any law
B) Not posting commercial messages to groups where the employee has received user consent
C) Not performing any nonrepudiation
D) Not attempting to break the security of any computer network

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution?


A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A social media manager is a person within the organization who is trusted to monitor,contribute,filter,and guide the social media presence of a company,individual,product,or brand.

A) True
B) False

Correct Answer

verifed

verified

What is spear phishing?


A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

A) True
B) False

Correct Answer

verifed

verified

What is the process that provides a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space?


A) Pharming
B) Authentication
C) Authorization
D) Programming

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is adware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What is a destructive agent?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) Content filtering,encryption,and firewalls
B) Calculating,locking,and firewalls
C) Content prohibiting,and cookies
D) None of these choices

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers,resolving customer issues,and developing and implementing systems for an optimal and efficient team.She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees.Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook.Which policy should the company implement to help eliminate this problem?


A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

A) True
B) False

Correct Answer

verifed

verified

Which quadrant in the cost of downtime includes equipment rental,overtime costs,and travel expenses?


A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of these choices

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 161 - 180 of 333

Related Exams

Show Answer