Correct Answer
verified
Multiple Choice
A) defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) discourages sending junk email or spam to anyone who doesn't want to receive it
C) informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) single-factor authentication
B) two-factor authentication
C) multifactor authentication
D) biometrics
Correct Answer
verified
Multiple Choice
A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization
Correct Answer
verified
Multiple Choice
A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) choosing to allow permission to incoming emails
D) choosing to deny permission to incoming emails
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cyberbullying
B) information vandalism
C) cookie
D) BYOD
Correct Answer
verified
Multiple Choice
A) information codes
B) information management
C) information deployment
D) information security
Correct Answer
verified
Multiple Choice
A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Correct Answer
verified
Multiple Choice
A) striker bunny
B) dumpster diving
C) trash retrieval
D) approved consent
Correct Answer
verified
Multiple Choice
A) social media monitoring
B) social media manager
C) social media policy
D) anti-spam policy
Correct Answer
verified
Multiple Choice
A) pharming
B) worm holes
C) phishing
D) insider hacking
Correct Answer
verified
Multiple Choice
A) data distribution of systems attack
B) data denial-of-software attack
C) distributed data online systems attack
D) distributed denial-of-service attack
Correct Answer
verified
Multiple Choice
A) spyware
B) spam
C) adware
D) None of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) key logger
B) hardware key logger
C) cookie
D) All of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Showing 261 - 280 of 331
Related Exams