Filters
Question type

Study Flashcards

A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.

A) True
B) False

Correct Answer

verifed

verified

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?


A) Spyware
B) Web log
C) Adware
D) Hardware key logger

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the below should be included in a company email privacy policy?


A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts as a trusted third party to verify information.One of Charles' largest clients is CheckMd,which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMD?


A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What is the legal protection afforded an expression of an idea,such as a song,book,or video game?


A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

A) True
B) False

Correct Answer

verifed

verified

Which of the below defines information security?


A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of the above

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is pirated software?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is competitive click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.

A) True
B) False

Correct Answer

verifed

verified

Identify the six epolicies organizations should implement to protect themselves.

Correct Answer

verifed

verified

An ethical computer use policy contains ...

View Answer

__________ is the electronic defacing of an existing website.

Correct Answer

verifed

verified

What is ediscovery?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Content ____________ occurs when organizations use software that filters content,such as emails,to prevent the accidental or malicious transmission of unauthorized information.

Correct Answer

verifed

verified

Which of the following is served as key evidence in many legal cases today and also provides a faster,easier way to search and organize paper documents?


A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Internet ____________ is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.

Correct Answer

verifed

verified

Showing 81 - 100 of 344

Related Exams

Show Answer