Filters
Question type

Study Flashcards

Identity theft is the forging of someone's identity for the purpose of fraud.

A) True
B) False

Correct Answer

verifed

verified

Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

What is a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?


A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?


A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.

A) True
B) False

Correct Answer

verifed

verified

A zombie farm is a group of computers on which a hacker has planted zombie programs.

A) True
B) False

Correct Answer

verifed

verified

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Information vandalism
C) Cookie
D) BYOD

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is vishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following definitions represents Internet censorship?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the below represents the definition of information management?


A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

DDoS stands for one of the common forms of viruses, that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?


A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?


A) An information privacy policy
B) An email privacy policy
C) An Internet use policy
D) A workplace monitoring policy

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Worm spreads itself, not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

A) True
B) False

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?


A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

One of the most ineffective ways to set up authentication techniques is by setting up user ID's and passwords.

A) True
B) False

Correct Answer

verifed

verified

What is spyware?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Showing 81 - 100 of 354

Related Exams

Show Answer