Filters
Question type

Study Flashcards

The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.

A) True
B) False

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) Must never upgrade or change vendors
B) Must download a portable button for it to activate
C) Must frequently update it to protect against viruses
D) All of the above

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is the correct list of the six different types of hackers listed in your text?


A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of the above

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of the above

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?


A) Sniffer
B) Spyware
C) Spoofware
D) Simplelocker

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Information compliance is the act of conforming, acquiescing, or yielding information.

A) True
B) False

Correct Answer

verifed

verified

Ransomware is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?


A) Ethical information
B) Information technology
C) Information policies
D) Information ethics

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm?


A) Personally identifiable information (PII)
B) Nonsensitive PII
C) Sensitive PII
D) Sock puppet marketing

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is pirated software?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Cryptography is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents opt-in?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
C) Choosing to allow permission to incoming emails.
D) Choosing to deny permission to incoming emails.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

What uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 121 - 140 of 354

Related Exams

Show Answer