Filters
Question type

Study Flashcards

Cybervandalism is the electronic defacing of an existing website.

A) True
B) False

Correct Answer

verifed

verified

What is ediscovery?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?


A) Information security
B) Physical security
C) Drive-by hacking
D) Adware

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

Two-factor authentication requires the user to provide two means of authentication,what the user knows (password)and what the user has (security token).

A) True
B) False

Correct Answer

verifed

verified

A social media manager refers to the process of monitoring and responding to what is being said about a company,individual,product,or brand.

A) True
B) False

Correct Answer

verifed

verified

Multifactor authentication requires more than two means of authentication such as what the user knows (password),what the user has (security token),and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.

A) True
B) False

Correct Answer

verifed

verified

What is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?


A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What is adware?


A) A form of malicious software that infects your computer and asks for money
B) A ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting.

A) True
B) False

Correct Answer

verifed

verified

Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal,pharming is illegal
B) Phishing is the right of the company,where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft,and pharming reroutes requests for legitimate websites to false websites
D) All of these choices

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.


A) the individual user
B) the company
C) the Human Resources department
D) the individual user's department

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

A) True
B) False

Correct Answer

verifed

verified

What is information security?


A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the below represents the biggest problem of information security breaches?


A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Showing 101 - 120 of 333

Related Exams

Show Answer