Filters
Question type

Study Flashcards

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

Which of the choices below represents the definition of information compliance?


A) the act of conforming, acquiescing, or yielding information
B) the ability to comply with software
C) the understanding of technology
D) the verbalization of information governance in a company's policies and procedures

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A zombie farm is a group of computers on which a hacker has planted zombie programs.

A) True
B) False

Correct Answer

verifed

verified

Backdoor programs open a way into the network for future attacks.

A) True
B) False

Correct Answer

verifed

verified

Ransomware is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network

A) True
B) False

Correct Answer

verifed

verified

What is phishing?


A) reroutes requests for legitimate websites to false websites.
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is not considered an epolicy?


A) acceptable use policy
B) internet use policy
C) ethical computer use policy
D) anti-hacker use policy

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A smart card is a device the size of a credit card that contains embedded technology that stores information and small amounts of software and can act as ________.


A) identification instruments
B) a form of digital cash
C) a data storage device
D) All of these are correct.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) splogs
B) adware
C) spygloss
D) CPU buzzer

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A user can opt out of receiving emails by choosing to deny permission to incoming emails.

A) True
B) False

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) sniffer
B) spyware
C) spoofware
D) splog

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?


A) information code
B) information technology
C) information management
D) information governance

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?


A) script kiddies
B) black-hat hacker
C) white-hat hacker
D) cracker

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Multifactor authentication is the traditional security process, which requires a user name and passworD.

A) True
B) False

Correct Answer

verifed

verified

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) malicious code
B) hoaxes
C) spoofing
D) sniffer

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What outlines the corporate guidelines or principles governing employee online communications?


A) social media monitoring
B) social media manager
C) social media policy
D) information privacy manager

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

Showing 201 - 220 of 331

Related Exams

Show Answer