Filters
Question type

Study Flashcards

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?


A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography

Correct Answer

verifed

verified

A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

Correct Answer

verifed

verified

What area of information security focuses on preventing identity theft, phishing, and pharming scams?


A) Prevention and resistance
B) Detection and authorizing
C) Detection and response
D) Authentication and authorization

Correct Answer

verifed

verified

Tokens are small electronic devices that change user passwords automatically.

Correct Answer

verifed

verified

One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.

Correct Answer

verifed

verified

What are the first two lines of defense a company should take when addressing security risks?


A) Technology first, customers second.
B) Technology first, people second.
C) Innovation first, technology second.
D) People first, technology second.

Correct Answer

verifed

verified

Which of the following is the main drawback of biometrics?


A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.

Correct Answer

verifed

verified

Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

Correct Answer

verifed

verified

What are biometrics?


A) The traditional security process that requires a user name and password.
B) A process that requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) A process that requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.

Correct Answer

verifed

verified

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?


A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking

Correct Answer

verifed

verified

What is the traditional security process that requires a user name and password?


A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics

Correct Answer

verifed

verified

What is information secrecy?


A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

Correct Answer

verifed

verified

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?


A) Digital code
B) Digital sign
C) Digital certificate
D) Digital card

Correct Answer

verifed

verified

A smart card is a device, the size of a credit card that contains embedded technology that stores information and small amounts of software, and can act as __________________.


A) Identification instruments
B) A form of digital cash
C) A data storage device
D) All of these

Correct Answer

verifed

verified

What reroutes requests for legitimate websites to false websites?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming

Correct Answer

verifed

verified

What is vishing?


A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

Correct Answer

verifed

verified

Where do organizations typically place firewalls?


A) Between a personal computer and the server.
B) Between a personal computer and a printer.
C) Between the server and the content filtering software.
D) Between the server and the Internet.

Correct Answer

verifed

verified

What can encryption technology perform?


A) Switch the order of characters.
B) Replace characters with other characters.
C) Insert or remove characters.
D) All of these.

Correct Answer

verifed

verified

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

Correct Answer

verifed

verified

What is it called when a hacker looks through your trash to find personal information?


A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent

Correct Answer

verifed

verified

Showing 61 - 80 of 113

Related Exams

Show Answer