Filters
Question type

Study Flashcards

Which of the following refers to a period of time when a system is unavailable?


A) Downtime
B) MIS down
C) Direct data loss
D) Downtown

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

Correct Answer

verifed

verified

What is forging of someone's identity for the purpose of fraud?


A) Identity crisis
B) Identity theft
C) Ediscovery
D) All of the above

Correct Answer

verifed

verified

There are three areas where technology can aid in the defense against attacks.Area one which is at the people level includes authentication and _____________________.

Correct Answer

verifed

verified

Worms are computer viruses that wait for a specific date before executing their instructions.

Correct Answer

verifed

verified

_______________ software is software that is manufactured to look like the real thing and sold as such.

Correct Answer

verifed

verified

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?


A) An internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming

Correct Answer

verifed

verified

What refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

Correct Answer

verifed

verified

Which of the following contains general principles to guide computer user behavior?


A) Information technology code
B) Technology policy
C) Ethical computer use policy
D) Information systems

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet

Correct Answer

verifed

verified

What is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens?


A) Typosquatting
B) Website name stealing
C) Internet censorship
D) Teergrubing

Correct Answer

verifed

verified

Jensen is a senior developer for HackersRUs,a company that helps secure management information systems.Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes.What type of hacker is Jensen?


A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker

Correct Answer

verifed

verified

To find out your company policy regarding such websites as YouTube,Facebook,and Twitter you would have to refer to the ____________ policy.


A) Internet use
B) Social media
C) Information use
D) Employee monitoring

Correct Answer

verifed

verified

The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time,overloading it and shutting it down.

Correct Answer

verifed

verified

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?


A) Email privacy policy
B) Spam policy and procedures
C) Anti-spam policy
D) Internet user policy

Correct Answer

verifed

verified

Which of the following clauses is typically contained in an acceptable use policy?


A) A nonrepudiation clause
B) A repudiation clause
C) A confidentiality clause
D) An employee use clause

Correct Answer

verifed

verified

What is click-fraud?


A) The electronic defacing of an existing website.
B) The abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.

Correct Answer

verifed

verified

What is a group of computers on which a hacker has planted zombie programs?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

Correct Answer

verifed

verified

Showing 221 - 240 of 342

Related Exams

Show Answer