Filters
Question type

Study Flashcards

A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.

A) True
B) False

Correct Answer

verifed

verified

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in its information security policies?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30 to 60 days
D) All of these

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What are computer viruses that wait for a specific date before executing their instructions?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A zombie farm is a group of computers on which a hacker has planted zombie programs.

A) True
B) False

Correct Answer

verifed

verified

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the following company policies?


A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of these

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?


A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the most secure type of authentication?


A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of these

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts a trusted third party to verify information.One of Charles's largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online.Having a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMd?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the biggest problem of information security breaches?


A) People misusing organizational information.
B) Technology failures.
C) Customers misusing organizational systems.
D) Company departments missing sales goals.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is two-factor authentication?


A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Worms are computer viruses that wait for a specific date before executing their instructions.

A) True
B) False

Correct Answer

verifed

verified

What is a destructive agent?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) Hackers looking through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuses their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal, pharming is illegal.
B) Phishing is the right of the company, where pharming is the right of the individual.
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites.
D) All of these.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?


A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a masquerading attack that combines spam with spoofing?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 113

Related Exams

Show Answer