A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information codes
B) Information management
C) Information deployment
D) Information security
Correct Answer
verified
Multiple Choice
A) The individual user
B) The company
C) The human resources department
D) The individual user's department
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of the above
Correct Answer
verified
Multiple Choice
A) Black-hat,cracker,cyberterrorist,hactivist,script kiddies,and white-hat hackers
B) Black-top,cookie,script kids,environment,Web 3.0,and white-top hackers
C) Black-hat,script kiddies,script bats,spider crawlers,Ad spiders,and white-hat hackers
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of these
Correct Answer
verified
Multiple Choice
A) Identification instruments
B) A form of digital cash
C) A data storage device
D) All of the above
Correct Answer
verified
Showing 321 - 340 of 344
Related Exams