Filters
Question type

Study Flashcards

Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchangeD.

A) True
B) False

Correct Answer

verifed

verified

Which of the following should be included in a company email privacy policy?


A) defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) discourages sending junk email or spam to anyone who doesn't want to receive it
C) informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of these are correct.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

What requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) ?


A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) biometrics

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is a phishing expedition?


A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following defines opt in?


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) choosing to allow permission to incoming emails
D) choosing to deny permission to incoming emails

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

A) True
B) False

Correct Answer

verifed

verified

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?


A) cyberbullying
B) information vandalism
C) cookie
D) BYOD

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis.Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively.What is Kristin overseeing for the company?


A) information codes
B) information management
C) information deployment
D) information security

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following definitions represents website name stealing?


A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is it called when a hacker looks through your trash to find personal information?


A) striker bunny
B) dumpster diving
C) trash retrieval
D) approved consent

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?


A) social media monitoring
B) social media manager
C) social media policy
D) anti-spam policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?


A) pharming
B) worm holes
C) phishing
D) insider hacking

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

A DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes.What does DDoS stand for?


A) data distribution of systems attack
B) data denial-of-software attack
C) distributed data online systems attack
D) distributed denial-of-service attack

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) spyware
B) spam
C) adware
D) None of these are correct.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

A) True
B) False

Correct Answer

verifed

verified

Which of the choices below is a common Internet monitoring technology?


A) key logger
B) hardware key logger
C) cookie
D) All of these are correct.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Backdoor programs change their form as they propagate.

A) True
B) False

Correct Answer

verifed

verified

What is drive-by hacking?


A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 261 - 280 of 331

Related Exams

Show Answer