Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30 to 60 days
D) All of these
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information ethics policy
B) Information security policies
C) Information technology plan
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Token
B) Password
C) Smart card
D) Biometrics
Correct Answer
verified
Multiple Choice
A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software
Correct Answer
verified
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) Combination of all of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) People misusing organizational information.
B) Technology failures.
C) Customers misusing organizational systems.
D) Company departments missing sales goals.
Correct Answer
verified
Multiple Choice
A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) Hackers looking through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuses their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
Multiple Choice
A) Phishing is not illegal, pharming is illegal.
B) Phishing is the right of the company, where pharming is the right of the individual.
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites.
D) All of these.
Correct Answer
verified
Multiple Choice
A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Showing 21 - 40 of 113
Related Exams