Filters
Question type

Study Flashcards

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?


A) Pharming
B) Authentication
C) Authorization
D) Programming

Correct Answer

verifed

verified

What is phishing?


A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

Correct Answer

verifed

verified

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?


A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software

Correct Answer

verifed

verified

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?


A) Token
B) Password
C) Smart card
D) Biometrics

Correct Answer

verifed

verified

What is the traditional security process, which requires a username and password?


A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal
B) It is viewed as an invasion of privacy
C) It can be costly and intrusive
D) It requires constant monitoring and upgrading

Correct Answer

verifed

verified

A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration of a speaker's mouth and throat, can be expressed as a mathematical formula. Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.

Correct Answer

verifed

verified

What are biometrics?


A) The traditional security process, which requires a username and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice, or handwriting.

Correct Answer

verifed

verified

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?


A) Voiceprint
B) Face
C) Iris
D) All of these

Correct Answer

verifed

verified

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

Correct Answer

verifed

verified

What is the difference between phishing and pharming?


A) Phishing is not illegal, pharming is illegal
B) Phishing is the right of the company, where pharming is the right of the individual
C) Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites
D) All of these

Correct Answer

verifed

verified

A pharming attack uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack.

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Phishing
B) Authentication
C) Authorization
D) Programming

Correct Answer

verifed

verified

Showing 101 - 113 of 113

Related Exams

Show Answer