Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing
Correct Answer
verified
Multiple Choice
A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Information vandalism
C) Cookie
D) BYOD
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.
Correct Answer
verified
Multiple Choice
A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy
Correct Answer
verified
Multiple Choice
A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack
Correct Answer
verified
Multiple Choice
A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
Showing 81 - 100 of 354
Related Exams