Filters
Question type

Study Flashcards

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

Phishing reroutes requests for legitimate websites to false websites.

A) True
B) False

Correct Answer

verifed

verified

Fair information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

A) True
B) False

Correct Answer

verifed

verified

Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.


A) counterfeit software
B) pirated software
C) ethical software
D) governance software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?


A) zombie
B) zombie farm
C) pharming attack
D) time bomb

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?


A) key logger
B) stealthware
C) clickstream
D) web log

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

A) True
B) False

Correct Answer

verifed

verified

Identity theft is the forging of someone's identity for the purpose of frauD.

A) True
B) False

Correct Answer

verifed

verified

Users would agree to all of the following in a typical acceptable use policy except ________.


A) not using the service as part of violating any law
B) not posting commercial messages to groups where the employee has received user consent
C) not performing any nonrepudiation
D) not attempting to break the security of any computer network

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) white-hat hacker
B) black-hat hacker
C) cyberterrorists
D) script bunnies

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.

A) True
B) False

Correct Answer

verifed

verified

What is spear phishing?


A) reroutes requests for legitimate websites to false websites
B) a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
C) a masquerading attack that combines spam with spoofing
D) a phishing expedition in which the emails are carefully designed to target a particular person or organization

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is an insider?


A) a form of social engineering in which one individual lies to obtain confidential data about another individual
B) a hacker looks through your trash to find personal information
C) legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
D) malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Cybervandalism is the electronic defacing of an existing website.

A) True
B) False

Correct Answer

verifed

verified

Which policy contains general principles regarding information privacy?


A) information privacy policy
B) acceptable use policy
C) internet use policy
D) anti-Spam policy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a form of malicious software that infects your computer and asks for money?


A) sniffer
B) spyware
C) spoofware
D) ransomware

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month.Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?


A) an information security plan
B) an ethical information policy
C) an antivirus plan
D) None of these are correct.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

eBay is an example of an online company that has been faced with numerous security issues.For example, imagine you purchase a digital camera on eBay.Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information.Of course, this email is not actually from eBay and as soon as you log in your information will be stolen.What type of information security breach would you consider this to be?


A) an Insider
B) dumpster diving
C) social engineering
D) phishing

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?


A) ediscovery
B) Child Online Protection Act
C) digital rights management
D) pirated software

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Showing 281 - 300 of 331

Related Exams

Show Answer