Filters
Question type

Study Flashcards

Frozen pipe, bomb threat, epidemic, fire, or terrorism are all examples of unplanned __________.

Correct Answer

verifed

verified

What is a mail bomb?


A) Sending a massive amount of email to a specific person or system, resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system, resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?


A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data or information required to function and grow effectively?


A) Information code
B) Information technology
C) Information management
D) Information governance

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Smoking areas are targeted by hackers; they regularly use smoking entrances to gain building access, where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?


A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Standards of living
D) Security

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

What is the difference between pirated and counterfeit software?


A) Counterfeit is fake technology products; pirated is invisible technological cameras placed online.
B) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software; counterfeit is software that is manufactured to look like the real thing and sold as such.
C) Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software; pirated is software that is manufactured to look like the real thing and sold as such.
D) Pirated is stolen software used to hack into a company's classified material; counterfeit is a fake version of firewall software.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is a program that, when installed on a computer, records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts a trusted third party to verify information.One of Charles' largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online, and having a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMD?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

A(n) _________ is software written with malicious intent to cause annoyance or damage.

Correct Answer

verifed

verified

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Web log
C) Adware
D) Hardware key logger

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.

A) True
B) False

Correct Answer

verifed

verified

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

A) True
B) False

Correct Answer

verifed

verified

What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?


A) Key logger
B) Stealthware
C) Clickstream
D) Web log

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 225

Related Exams

Show Answer