Filters
Question type

Study Flashcards

eBay is an example of an online company that has been faced with numerous security issues.For example,imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course,this email is not actually from eBay and as soon as you log in your information will be stolen.What type of information security breach would you consider this to be?


A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Correct Answer

verifed

verified

Hactivists or Hackti...

View Answer

Decrypt information is to decode it and is the opposite of encrypt.

A) True
B) False

Correct Answer

verifed

verified

The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

Correct Answer

verifed

verified

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

One of the most ineffective ways to set up authentication techniques is by setting up user ID's and passwords.

A) True
B) False

Correct Answer

verifed

verified

What is ediscovery?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software.
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What can encryption technology perform?


A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of the above

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves,not just from file to file,but also from computer to computer?


A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Backdoor programs change their form as they propagate.

A) True
B) False

Correct Answer

verifed

verified

_________ programs are viruses that open a way into the network for future attacks.

Correct Answer

verifed

verified

Backdoor o...

View Answer

A(n)_______ is a program or device that can monitor data traveling over a network.

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.

A) True
B) False

Correct Answer

verifed

verified

The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

Correct Answer

verifed

verified

____________ are the principles and standards that guide our behavior toward other people.

Correct Answer

verifed

verified

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

Enter tangible or intangible in the box below: Intellectual property is _________________ creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

Correct Answer

verifed

verified

Showing 301 - 320 of 342

Related Exams

Show Answer