Correct Answer
verified
Multiple Choice
A) Exposure
B) Information security
C) Threat
D) Security
Correct Answer
verified
Multiple Choice
A) Dumpster diving
B) Shoulder surfing
C) Social engineering
D) Tailgating
Correct Answer
verified
Multiple Choice
A) deliberate; unintentional
B) deliberate; deliberate
C) unintentional; deliberate
D) unintentional; unintentional
Correct Answer
verified
Multiple Choice
A) back door
B) denial-of-service attack
C) phishing attack
D) virus
Correct Answer
verified
Multiple Choice
A) back door
B) denial-of-service attack
C) logic bomb
D) phishing attack
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Does
B) Has
C) Is
D) Knows
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the Heartbleed bug
B) FireEye
C) Shodan
D) SpyEye
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) it's a single point of failure
B) it's too hard to do
C) it will invade our privacy
D) there are no problems with multifactor authentication
Correct Answer
verified
Multiple Choice
A) a hacker website
B) a service that searches the internet for devices connected to the internet
C) a website that shows which devices are vulnerable to hackers
D) to help users search for other people who use similar devices
Correct Answer
verified
Multiple Choice
A) how vulnerable all devices are, even if they aren't connected to the internet
B) strong passwords aren't necessary on home devices since most hackers don't care about such a small target
C) that hackers and security researchers use the same sites to identify vulnerabilities
D) the government is doing nothing to protect our privacy
Correct Answer
verified
Multiple Choice
A) acceptance
B) analysis
C) limitation
D) transference
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Australia
B) China
C) India
D) United Kingdom
Correct Answer
verified
Multiple Choice
A) Competitive intelligence
B) Espionage
C) Information extortion
D) Intellectual property
Correct Answer
verified
Showing 1 - 20 of 75
Related Exams