Filters
Question type

Study Flashcards

Which of the following describes confidentiality?


A) the assurance that messages and information are available only to those who are authorized to view them
B) policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) the principles and standards that guide our behavior toward other people

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) spyware
B) hacker
C) drive-by hacking
D) adware

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What occurs when a person chooses to deny permission to incoming emails?


A) opt out
B) website name stealing
C) Internet censorship
D) teergrubing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If an organization implemented only one policy, which one would it want to implement?


A) information privacy policy
B) acceptable use policy
C) internet use policy
D) ethical computer use policy

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to allow permissions to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

A phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username, password, and sometimes credit card information.

A) True
B) False

Correct Answer

verifed

verified

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?


A) pharming
B) phishing
C) phishing expedition
D) vishing

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules.


A) informed; collaborate
B) consent; informed
C) informed; consent
D) consent; information

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

A pharming attack uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack.

A) True
B) False

Correct Answer

verifed

verified

A user can opt in to receive emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.

A) True
B) False

Correct Answer

verifed

verified

Showing 321 - 331 of 331

Related Exams

Show Answer