Filters
Question type

Study Flashcards

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers.Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names.This is a classic example of which of the following security breaches?


A) A social engineer
B) An insider
C) A spammer
D) A dumpster diver

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is pharming?


A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following represents the three areas where technology can aid in the defense against information security attacks?


A) Authentication and authorization, prevention and resistance, prevention and response
B) Authentication and authorization, prevention and response, detection and response
C) Analyzing and authenticating, prevention and repositioning, detection and response
D) Authentication and authorization, prevention and resistance, detection and response

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What is spear phishing?


A) A rerouting of requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?


A) Pharming
B) Authentication
C) Authorization
D) Programming

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?


A) Antivirus software
B) Content filtering
C) Encryption
D) Firewalls

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.

A) True
B) False

Correct Answer

verifed

verified

Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

A) True
B) False

Correct Answer

verifed

verified

What type of encryption technology uses multiple keys, one for public and one for private?


A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

To decrypt information is to decode it and is the opposite of encrypt.

A) True
B) False

Correct Answer

verifed

verified

What decodes information?


A) Digital certificate
B) Encryption
C) Decryption
D) Cryptography

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?


A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense.The first is people and the second is technology.

A) True
B) False

Correct Answer

verifed

verified

What requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) ?


A) Single-factor authentication
B) Two-factor authentication
C) Multifactor authentication
D) Biometrics

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Working at a ski resort in the mountains has its own unique security issues.Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month.Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information.He suspects that this may be the cause of an internal employee.He needs to clarify and establish what type of plan to help reduce further problems?


A) An information security plan
B) An ethical information policy
C) An anti-virus plan
D) None of these

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Phishing
B) Authentication
C) Authorization
D) Programming

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers.Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer.Without realizing it Janet is creating the potential for which type of information security breach to occur?


A) Insiders to hack into the college system.
B) Dumpster diving to find usernames and passwords.
C) Viruses and worms to spread through the college system.
D) All of these.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Describe the relationship between information security policies and an information security plan.

Correct Answer

verifed

verified

Information security policies identify t...

View Answer

Which of the following authentication methods is 100 percent accurate?


A) Smart card
B) Fingerprint authentication
C) User ID
D) None of these

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Single-factor authentication is the traditional security process, which requires a user name and password.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 113

Related Exams

Show Answer