Filters
Question type

Study Flashcards

The best and most effective way to manage authentication is through ___________.


A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

A) True
B) False

Correct Answer

verifed

verified

Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.

Correct Answer

verifed

verified

Program or...

View Answer

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?


A) Smart card
B) Token
C) Biometrics
D) Content filtering

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Employee monitoring policies explicitly state how,when,and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A smart card is a device,the size of a credit card that contains embedded technology that stores information and small amounts of software,and can act as __________________.


A) Identification instruments
B) A form of digital cash
C) A data storage device
D) All of the above

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Information compliance is the act of conforming,acquiescing,or yielding information.

A) True
B) False

Correct Answer

verifed

verified

What is adware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is served as key evidence in many legal cases today and also provides a faster,easier way to search and organize paper documents?


A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

Software o...

View Answer

Which act protects investors by improving the accuracy and reliability of corporate disclosures?


A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort,and he is faced with both physical and information security threats every month.Since the resort implemented a new software system,they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?


A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.

A) True
B) False

Correct Answer

verifed

verified

Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

A) True
B) False

Correct Answer

verifed

verified

Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.

A) True
B) False

Correct Answer

verifed

verified

A zombie farm is a group of computers on which a hacker has planted zombie programs.

A) True
B) False

Correct Answer

verifed

verified

A DDoS stands for one of the common forms of viruses,that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?


A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

Showing 201 - 220 of 342

Related Exams

Show Answer