Filters
Question type

Study Flashcards

Using ones social skills to trick people into revealing access credentials or other valuable information is called ______________.


A) Social engineering
B) Social media
C) Social viruses
D) Social processes

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is vishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

___________ refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.

Correct Answer

verifed

verified

Ediscovery...

View Answer

Through social ____________,hackers use their social skills to trick people into revealing access credentials or other valuable information.

Correct Answer

verifed

verified

What is software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Pirated software is software that is manufactured to look like the real thing and sold as such.

A) True
B) False

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

The three primary information security areas are 1)authentication and authorization,2)policies and rewards,and 3)detection and response.

A) True
B) False

Correct Answer

verifed

verified

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

A) True
B) False

Correct Answer

verifed

verified

Crackers,cyberterrorists,hactivists,and script bunnies are all types of __________.

Correct Answer

verifed

verified

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

Correct Answer

verifed

verified

Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.

A) True
B) False

Correct Answer

verifed

verified

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

A) True
B) False

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea,such as a song,book,or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What is the process that provides a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space?


A) Pharming
B) Authentication
C) Authorization
D) Programming

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming,acquiescing,or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.

Correct Answer

verifed

verified

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?


A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 141 - 160 of 342

Related Exams

Show Answer