Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) counterfeit software
B) pirated software
C) ethical software
D) governance software
Correct Answer
verified
Multiple Choice
A) zombie
B) zombie farm
C) pharming attack
D) time bomb
Correct Answer
verified
Multiple Choice
A) key logger
B) stealthware
C) clickstream
D) web log
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) not using the service as part of violating any law
B) not posting commercial messages to groups where the employee has received user consent
C) not performing any nonrepudiation
D) not attempting to break the security of any computer network
Correct Answer
verified
Multiple Choice
A) white-hat hacker
B) black-hat hacker
C) cyberterrorists
D) script bunnies
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization
Correct Answer
verified
Multiple Choice
A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) information privacy policy
B) acceptable use policy
C) internet use policy
D) anti-Spam policy
Correct Answer
verified
Multiple Choice
A) sniffer
B) spyware
C) spoofware
D) ransomware
Correct Answer
verified
Multiple Choice
A) an information security plan
B) an ethical information policy
C) an antivirus plan
D) None of these are correct.
Correct Answer
verified
Multiple Choice
A) an Insider
B) dumpster diving
C) social engineering
D) phishing
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) ediscovery
B) Child Online Protection Act
C) digital rights management
D) pirated software
Correct Answer
verified
Showing 281 - 300 of 331
Related Exams