Filters
Question type

Study Flashcards

Which of the following would you find in a typical Internet use policy?


A) user ramifications if the policy is violated
B) user responsibility for properly handling offensive material
C) user responsibility for protecting the company's good name
D) All of these are correct.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) firewall
B) certificate authority
C) online certificate
D) digital certificate

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

A) True
B) False

Correct Answer

verifed

verified

What is ediscovery?


A) the unauthorized use, duplication, distribution, or sale of copyrighted software
B) refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) passed to protect minors from accessing inappropriate material on the Internet
D) a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Single-factor authentication is the traditional security process, which requires a user name and passworD.

A) True
B) False

Correct Answer

verifed

verified

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?


A) typosquatting
B) website name stealing
C) internet censorship
D) teergrubing

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is included in the four quadrants of ethical and legal behavior?


A) legal behavior and ethical behavior.
B) illegal behavior and ethical behavior.
C) legal behavior and unethical behavior.
D) All of these are correct.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) information secrecy
B) phishing
C) phishing expedition
D) spear phishing

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) email privacy policy
B) spam policy and procedures
C) anti-spam policy
D) Internet user policy

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

A) True
B) False

Correct Answer

verifed

verified

What is adware?


A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of these are correct.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following defines opt out?


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) choosing to allow permission to incoming emails
D) choosing to deny permission to incoming emails

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is vishing?


A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.

A) True
B) False

Correct Answer

verifed

verified

What refers to denying permissions to incoming emails?


A) opt out
B) opt in
C) BYOD
D) nonrepudiation

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Information compliance is the act of conforming, acquiescing, or yielding information.

A) True
B) False

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

Cyberbullying is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or branD.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 331

Related Exams

Show Answer