Filters
Question type

Study Flashcards

Which of the following defines physical security?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) Choosing to deny permission to incoming emails.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Single-factor authentication is the traditional security process, which requires a user name and password.

A) True
B) False

Correct Answer

verifed

verified

A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

A) True
B) False

Correct Answer

verifed

verified

An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

A) True
B) False

Correct Answer

verifed

verified

What are destructive agents?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the above

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?


A) Information security
B) Physical security
C) Drive-by hacking
D) Adware

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A worm is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is adware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

If an organization implemented only one policy, which one would it want to implement?


A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

What is drive-by hacking?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Web log
C) Adware
D) Hardware key logger

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?


A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 354

Related Exams

Show Answer