Filters
Question type

Study Flashcards

Identity theft is the forging of someone's identity for the purpose of fraud.

A) True
B) False

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or an information inquiry?


A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is information security?


A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?


A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Denial-of-service attack (DoS)______________ a website with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

_______________ is a hacker with criminal intent.

Correct Answer

verifed

verified

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

A) True
B) False

Correct Answer

verifed

verified

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

A) True
B) False

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content,such as email,to prevent the accidental or malicious transmission of unauthorized information?


A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

An ethical computer use policy contains ...

View Answer

The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called __________ computer use policy.

Correct Answer

verifed

verified

Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.

Correct Answer

verifed

verified

Computers ...

View Answer

Website name _________ is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.

Correct Answer

verifed

verified

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

A) True
B) False

Correct Answer

verifed

verified

What are computer viruses that wait for a specific date before executing their instructions?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which quadrant in the cost of downtime includes equipment rental,overtime costs,and travel expenses?


A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is competitive click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is software written with malicious intent to cause annoyance or damage?


A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 261 - 280 of 342

Related Exams

Show Answer