Filters
Question type

Study Flashcards

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?


A) digital certificate
B) encryption
C) decrypt
D) cryptography

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Charles Mott works for a company called VeriSign that acts as a trusted third party to verify information.One of Charles's largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online, and a third party validating the reviews is critical to CheckMd's success.What type of authentication technique is VeriSign providing for CheckMD?


A) firewall
B) certificate authority
C) online certificate
D) digital content certificate

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following describes workplace MIS monitoring?


A) tracking people's activities by such measures as number of keystrokes
B) tracking people's activities by such measures as error rate
C) tracking people's activities by such measures as number of transactions processed
D) All of these are correct.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties.What is a system that can track employees' activities by measures such as keystrokes, error rate, and number of transactions processed?


A) anti-spam system
B) information intelligence system
C) workplace MIS monitoring
D) company technology monitoring

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?


A) pharming
B) authentication
C) authorization
D) programming

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) backdoor programs
B) drive-by hacking
C) polymorphic viruses and worms
D) hacker

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What are biometrics?


A) the traditional security process, which requires a user name and password
B) requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
C) requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification)
D) the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack?


A) zombie
B) zombie farm
C) pharming attack
D) time bomb

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) malicious code
B) hoaxes
C) spoofing
D) sniffer

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Worms are computer viruses that wait for a specific date before executing their instructions.

A) True
B) False

Correct Answer

verifed

verified

Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

A) True
B) False

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) information management
B) information compliance
C) information governance
D) information secrecy

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is ransomware?


A) a form of malicious software that infects your computer and asks for money
B) a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C) software that allows Internet advertisers to display advertisements without the consent of the computer user
D) a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) between a personal computer and the server
B) between a personal computer and a printer
C) between the server and the content filtering software
D) between the server and the Internet

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Click-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

A) True
B) False

Correct Answer

verifed

verified

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

A) True
B) False

Correct Answer

verifed

verified

What is a program, when installed on a computer, records every keystroke and mouse click?


A) key logger software
B) spyware
C) cookie
D) adware

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

A) True
B) False

Correct Answer

verifed

verified

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?


A) spyware
B) hacker
C) drive-by hacking
D) adware

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.These characteristics, which are based on the physical configuration of a speaker's mouth and throat, can be expressed as a mathematical formulA.Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.

A) True
B) False

Correct Answer

verifed

verified

Showing 241 - 260 of 331

Related Exams

Show Answer