Filters
Question type

Study Flashcards

What is a destructive agent?


A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.

A) True
B) False

Correct Answer

verifed

verified

True

What is two-factor authentication?


A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

A worm is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

What is digital rights management?


A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?


A) ediscovery
B) Child Online Protection Act
C) digital rights management
D) pirated software

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following definitions represents physical security?


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) tangible protection such as alarms, guards, fireproof doors, fences, and vaults
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) choosing to deny permission to incoming emails

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

B

Spyware is software that, while purporting to serve some useful function and often fulfills that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

Bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?


A) fiscal responsibility
B) damaged reputation
C) other expenses
D) regeneration quadrant

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is single-factor authentication?


A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice or handwriting

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Trust between companies, customers, partners, and suppliers are the support structure of which of the following?


A) ebusiness
B) eharmony
C) esoftware
D) epolicies

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.


A) legal and confidential
B) legal and ethical
C) legal and technical
D) confidential and open

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

A user can opt in to receive emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?


A) antivirus software
B) content filtering
C) encryption
D) firewalls

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Using one's social skills to trick people into revealing access credentials or other valuable information is called ________.


A) social engineering
B) social media
C) social viruses
D) social processes

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

A

Which of the following describes privacy?


A) the assurance that messages and data are available only to those who are authorized to view them
B) policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) the right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) the principles and standards that guide our behavior toward other people

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 331

Related Exams

Show Answer