Filters
Question type

Study Flashcards

What is spear phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?


A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Cybervandalism is the electronic defacing of an existing website.

A) True
B) False

Correct Answer

verifed

verified

As the President of a local trade company,Kristin is faced with leadership,ethical,and operational decisions on a daily basis.Kristin's responsibilities include examining the organizational resource of information and regulating its definitions,uses,value,and distribution ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?


A) Information codes
B) Information management
C) Information deployment
D) Information security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.


A) The individual user
B) The company
C) The human resources department
D) The individual user's department

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat,cracker,cyberterrorist,hactivist,script kiddies,and white-hat hackers
B) Black-top,cookie,script kids,environment,Web 3.0,and white-top hackers
C) Black-hat,script kiddies,script bats,spider crawlers,Ad spiders,and white-hat hackers
D) None of the above

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Information ____________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Correct Answer

verifed

verified

What is vishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Backdoor programs change their form as they propagate.

A) True
B) False

Correct Answer

verifed

verified

Which of the following describes privacy?


A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be,to have control over your own personal possessions,and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

The most common type of defense within detection and response technologies is _________ software.

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of these

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A smart card is a device,the size of a credit card that contains embedded technology that stores information and small amounts of software,and can act as __________________.


A) Identification instruments
B) A form of digital cash
C) A data storage device
D) All of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 321 - 340 of 344

Related Exams

Show Answer