A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) The individual user
B) The company
C) The human resources department
D) The individual user's department
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
Multiple Choice
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of the above
Correct Answer
verified
Multiple Choice
A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Individuals copy,use,and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of the above offers an example of acting ethically
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Cookie
D) All of this
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Social media policy
C) Information privacy policy
D) Email privacy policy
Correct Answer
verified
Multiple Choice
A) Information security
B) Physical security
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Spyware
B) Spam
C) Adware
D) None of the above
Correct Answer
verified
Multiple Choice
A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Showing 21 - 40 of 342
Related Exams