A) Social engineering
B) Social media
C) Social viruses
D) Social processes
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Correct Answer
verified
Multiple Choice
A) Pharming
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The act of conforming,acquiescing,or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Correct Answer
verified
Showing 141 - 160 of 342
Related Exams