A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
Multiple Choice
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual
B) A hacker looks through your trash to find personal information
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
Multiple Choice
A) Phishing
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Per hour,per day,and per week
B) Per employee,per computer,and per company
C) Per stock,per stockholder,and per investment capital
D) None of these choices
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
Multiple Choice
A) Power outages
B) Tornados
C) A system upgrade
D) Network failure
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information
Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 221 - 240 of 333
Related Exams