Filters
Question type

Study Flashcards

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter you would have to refer to the ________ policy.


A) Internet use policy
B) Social media policy
C) Information use policy
D) Employee monitoring policy

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What is pretexting?


A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janet is creating the potential for which type of information security breach to occur?


A) Insiders to hack into the college system
B) Dumpster diving to find usernames and passwords
C) Viruses and worms to spread through the college system
D) All of the above

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is ransomware?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Multi-factor authentication is the traditional security process, which requires a user name and password.

A) True
B) False

Correct Answer

verifed

verified

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?


A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations?


A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures as keystrokes, error rate, and number of transaction processed?


A) Anti-spam system
B) Information intelligence system
C) Workplace MIS monitoring
D) Company technology monitoring

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

A) True
B) False

Correct Answer

verifed

verified

Backdoor programs change their form as they propagate.

A) True
B) False

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

What is spyware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

A) True
B) False

Correct Answer

verifed

verified

What includes governments that are after some form of information about other governments?


A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

A) True
B) False

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal, pharming is illegal
B) Phishing is the right of the company, where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites
D) All of the above

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 354

Related Exams

Show Answer