Filters
Question type

Study Flashcards

Dumpster diving, another security breach for companies, occurs when people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

False

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Using one's social skills to trick people into revealing access credentials or other valuable information is called ______________.


A) Social engineering
B) Social media
C) Social viruses
D) Social processes

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A

The three primary information security areas are (1) authentication and authorization, (2) policies and rewards, and (3) detection and response.

A) True
B) False

Correct Answer

verifed

verified

A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

A) True
B) False

Correct Answer

verifed

verified

Identity theft is the forging of someone's identity for the purpose of fraud.

A) True
B) False

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

What must you do with antivirus software to make it protect effectively?


A) Must never upgrade or change vendors.
B) Must download a portable button for it to activate.
C) Must frequently update it to protect against viruses.
D) All of these.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is phishing?


A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.These characteristics, which are based on the physical configuration of a speaker's mouth and throat, can be expressed as a mathematical formula.Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.

A) True
B) False

Correct Answer

verifed

verified

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

A) True
B) False

Correct Answer

verifed

verified

The most secure procedures combine which of the following authentication and authorization techniques?


A) Something the user knows, such as a user ID and password
B) Something the user has, such as a smart card or token
C) Something that is part of the user, such as a fingerprint or voice signature
D) All of these

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?


A) Interconnected data software (IDS)
B) Intrusion detection software (IDS)
C) Security Information system (SIS)
D) Internet detection scanner (IDS)

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

What is a phishing expedition?


A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

A) True
B) False

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false website?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

How do prevention and resistance technologies stop intruders from accessing and reading sensitive information?


A) Content filtering, encryption, and firewalls
B) Calculating, locking, and firewalls
C) Content prohibiting, and cookies
D) None of these

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Multifactor authentication is the traditional security process, which requires a user name and password.

A) True
B) False

Correct Answer

verifed

verified

False

Showing 1 - 20 of 113

Related Exams

Show Answer