Filters
Question type

Study Flashcards

What is a form of malicious software that infects your computer and asks for money?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) Backdoor programs
B) Drive-by hacking
C) Polymorphic viruses and worms
D) Hacker

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?


A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

The best and most effective way to manage authentication is through ________.


A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?


A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Cybervandalism includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

A) True
B) False

Correct Answer

verifed

verified

What is scareware?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The three primary information security areas are 1)authentication and authorization, 2)policies and rewards, and 3)detection and response.

A) True
B) False

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a digital camera on eBay. Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information. Of course, this email is not actually from eBay and as soon as you log in your information will be stolen. What type of information security breach would you consider this to be?


A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is Cybervandalism?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

A) True
B) False

Correct Answer

verifed

verified

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

A) True
B) False

Correct Answer

verifed

verified

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What includes any data that could potentially identify a specific individual?


A) Personally identifiable information (PII)
B) Nonsensitive PII
C) Sensitive PII
D) Sock puppet marketing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is digital rights management?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

What refers to denying permissions to incoming emails?


A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is the traditional security process, which requires a user name and password?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 181 - 200 of 354

Related Exams

Show Answer