Filters
Question type

Study Flashcards

Which policy details the extent to which email messages may be read by others?


A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of the above

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false website?


A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing

E) All of the above
F) None of the above

Correct Answer

verifed

verified

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.


A) Informed,collaborate
B) Consent,informed
C) Informed,consent
D) Consent,information

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

What is it called when a hacker looks through your trash to find personal information?


A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Denial-of-service attack (DoS)_______________ a website with so many requests for service that it slows down or crashes the site.

Correct Answer

verifed

verified

The___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming,acquiescing,or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.

A) True
B) False

Correct Answer

verifed

verified

A company should be able to calculate the cost of downtime by which of the following?


A) Per hour,per day,and per week
B) Per employee,per computer,and per company
C) Per stock,per stockholder,and per investment capital
D) None of the above

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

_______________ is a hacker with criminal intent.

Correct Answer

verifed

verified

Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.

A) True
B) False

Correct Answer

verifed

verified

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

A) True
B) False

Correct Answer

verifed

verified

Which act protects investors by improving the accuracy and reliability of corporate disclosures?


A) Sarbanes-Oxley Act
B) Identity Theft and Assumption Deterrence Act
C) CAN-Spam Act
D) None of the above

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What includes a variety of threats such as viruses,worms,and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Frozen pipe,bomb threat,epidemic,fire,or terrorism are all examples of unplanned __________.

Correct Answer

verifed

verified

Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.

A) True
B) False

Correct Answer

verifed

verified

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

Correct Answer

verifed

verified

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 344

Related Exams

Show Answer