A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver
Correct Answer
verified
Multiple Choice
A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
Multiple Choice
A) Authentication and authorization, prevention and resistance, prevention and response
B) Authentication and authorization, prevention and response, detection and response
C) Analyzing and authenticating, prevention and repositioning, detection and response
D) Authentication and authorization, prevention and resistance, detection and response
Correct Answer
verified
Multiple Choice
A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Pharming
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Multiple Choice
A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics
Correct Answer
verified
Multiple Choice
A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of these
Correct Answer
verified
Multiple Choice
A) Phishing
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Multiple Choice
A) Insiders to hack into the college system.
B) Dumpster diving to find usernames and passwords.
C) Viruses and worms to spread through the college system.
D) All of these.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these
Correct Answer
verified
True/False
Correct Answer
verified
Showing 81 - 100 of 113
Related Exams