A) Pharming
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software
Correct Answer
verified
Multiple Choice
A) Token
B) Password
C) Smart card
D) Biometrics
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics
Correct Answer
verified
Multiple Choice
A) It is considered illegal
B) It is viewed as an invasion of privacy
C) It can be costly and intrusive
D) It requires constant monitoring and upgrading
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The traditional security process, which requires a username and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice, or handwriting.
Correct Answer
verified
Multiple Choice
A) Voiceprint
B) Face
C) Iris
D) All of these
Correct Answer
verified
Multiple Choice
A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver
Correct Answer
verified
Multiple Choice
A) Phishing is not illegal, pharming is illegal
B) Phishing is the right of the company, where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Phishing
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Showing 101 - 113 of 113
Related Exams