Filters
Question type

Study Flashcards

What is information secrecy?


A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Enter white or black in the space below: ___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

Correct Answer

verifed

verified

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.


A) The individual user
B) The company
C) The human resources department
D) The individual user's department

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

Correct Answer

verifed

verified

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

Correct Answer

verifed

verified

There are two means of stealing an identity.One is ____________,which reroutes requests for legitimate websites to false websites.

Correct Answer

verifed

verified

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

What is pharming?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following describes workplace MIS monitoring?


A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames,passwords,personal information,and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names.This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is spear phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy,use,and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above offers an example of acting ethically

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website?


A) Cyberbulling
B) Cybervandalism
C) Cookie
D) All of this

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following policies states that users agree to follow it in order to be given access to corporate email,information systems,and the Internet?


A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?


A) Information security
B) Physical security
C) Drive-by hacking
D) Adware

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What decodes information?


A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

Correct Answer

verifed

verified

What is unsolicited email that plagues employees at all levels and clogs email systems?


A) Spyware
B) Spam
C) Adware
D) None of the above

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following governs the ethical and moral issues arising from the development and use of information technologies,and the creation,collection,duplication,distribution,and processing of information?


A) Ethical information
B) Information technology
C) Information policies
D) Information ethics

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

What is a hacker?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 342

Related Exams

Show Answer