Filters
Question type

Study Flashcards

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

Which of the following can be completed by encryption?


A) Switch the order of characters
B) Replace characters with other characters
C) Use a mathematical formula to convert the information into some sort of code
D) All of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?


A) Information privacy policy
B) Acceptable use policy
C) Anti-spam policy
D) Ethical computer use policy

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are people very knowle...

View Answer

What is it called when you may use copyrighted material in certain situations-for example, in the creation of new work or, within certain limits, for teaching purposes?


A) Ethics
B) Intellectual property
C) Copyright
D) Fair dealing

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Summarize the different monitoring technologies and explain the importance of an employee monitoring policy

Correct Answer

verifed

verified

Different monitoring technologies includ...

View Answer

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

A) True
B) False

Correct Answer

verifed

verified

____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following does a firewall perform?


A) Examines each message that wants entrance to the network
B) Blocks messages without the correct markings from entering the network
C) Detects computers communicating with the Internet without approval
D) All of the above

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What floods a Web site with so many requests for service that it slows down or crashes the site?


A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Describe authentication and the most secure type of authentication.

Correct Answer

verifed

verified

Authentication is a method for confirmin...

View Answer

Who breaks into other people's computer systems and just looks around or steals and destroys information?


A) White-hat hacker
B) Black-hat hacker
C) Hactivists
D) Script kiddies

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following represents the classic example of unintentional information reuse?


A) Phone number
B) Social Security number
C) Address
D) Driver's license number

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is the policy that contains general principles to guide computer user behaviour?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) None of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Ethical concerns over ______________ monitoring occurs when the monitoring is unprecedented or overly intrusive

Correct Answer

verifed

verified

Surprisingly, the biggest issue surrounding information security is not a technical issue, but a _____________ issue.

Correct Answer

verifed

verified

List and describe the three primary security areas.

Correct Answer

verifed

verified

(1) Authentication and authorization Som...

View Answer

Which of the following is not included in the four quadrants of ethical and legal behaviour?


A) Legal behaviour and ethical behaviour
B) Illegal behaviour and ethical behaviour
C) Legal behaviour and unethical behaviour
D) None of the above

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?


A) Computer virus
B) Worm
C) Denial-of-service attack
D) None of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 141 - 160 of 171

Related Exams

Show Answer