Filters
Question type

Study Flashcards

Worms are computer viruses that wait for a specific date before executing their instructions.

A) True
B) False

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success. What type of authentication technique is VeriSign providing for CheckMD?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.

A) True
B) False

Correct Answer

verifed

verified

The most secure procedures combine which of the following authentication and authorization techniques?


A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) All of these

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is pretexting?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.

A) True
B) False

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) Authentication and authorization, prevention and resistance, prevention and response
B) Authentication and authorization, prevention and response, detection and response
C) Analyzing and authenticating, prevention and repositioning, detection and response
D) Authentication and authorization, prevention and resistance, detection and response

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

A) True
B) False

Correct Answer

verifed

verified

What is an insider?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is hardware or software that guards a private network by analyzing incoming and outgoing information for the correct markings?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A smart card is a device the size of a credit card that contains embedded technology that stores information and small amounts of software, and can act as ________.


A) identification instruments
B) a form of digital cash
C) a data storage device
D) All of these

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is an example of a way to maintain information security that a company should include in their information security policies?


A) Requiring computer users to log off before leaving for lunch
B) Never sharing user or password information with anyone
C) Changing passwords every 30-60 days
D) All of these

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is spear phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) Content filtering, encryption, and firewalls
B) Calculating, locking, and firewalls
C) Content prohibiting, and cookies
D) None of these

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Phishing reroutes requests for legitimate websites to false websites.

A) True
B) False

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Single-factor authentication is the traditional security process, which requires a username and password.

A) True
B) False

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense. The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 81 - 100 of 113

Related Exams

Show Answer