Filters
Question type

Study Flashcards

Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog and passed it off as his original work. This is an example of ________.


A) online identity theft
B) embezzlement
C) shadowing
D) plagiarism

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following precautions need to be taken in order to create a secure password?


A) Personal information should not be used in passwords.
B) Consistently similar character types should be used.
C) A single, memorable password should be used for all logins.
D) Passwords should rarely be changed.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

A drawback of using proxy servers for online anonymity is the need to rely on the company that operates the proxy servers and its promise to protect its customers' identities.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a technical control that helps secure information flow in an organization?


A) The information system enforces approved authorizations for access to the system.
B) The information system enforces the organization's policy about human review.
C) The information system automatically disables accounts after a time period defined by the organization.
D) The information system defines the information to be encrypted or stored offline in a secure location.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

________ consists of intangible assets which are expressions of the human mind that give the creator of the property the right to its commercial value.


A) Immovable property
B) Freehold property
C) Intellectual property
D) Public property

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is a proxy server? What function does it serve?

Correct Answer

verifed

verified

A proxy is an intermediary server that r...

View Answer

The downside of using surveillance techniques at work is that it pits management against staff.

A) True
B) False

Correct Answer

verifed

verified

In Internet terminology, a worm refers to a(n) ________.


A) email program created not for communication but to lure spam
B) software program that attracts malicious attacks in order to study their properties and origins
C) self-replicating program that sends copies to other nodes on a computer network
D) software tool used to inspect incoming and outgoing traffic to a computer network

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is utilitarianism and how is it different from natural laws and rights?

Correct Answer

verifed

verified

Natural laws and rights judge the morali...

View Answer

A ________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations.


A) captive portal
B) proxy
C) firewall
D) keylogger

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following is a feature of public key encryption?


A) It uses a single point key to encrypt and decrypt data.
B) It uses a pair of keys, one to encrypt the data and the other to decrypt data.
C) It uses multiple numbers of keys accessible to all members of an organization.
D) It uses a duplication process to replicate keys.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

A(n) ________ lists out and rates the vulnerabilities of an organization.


A) risk matrix
B) incidence response plan
C) public key encryption scheme
D) social engineering plan

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is a reason why humans are soft targets for social engineering?


A) need for anonymity
B) respect for authority
C) need for privacy
D) desire to be disconnected from others

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.


A) expert systems
B) web crawlers
C) honeypots
D) server farms

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following statements is true of honeypots?


A) They deny the entry or exit of specific IP addresses, products, Internet domains, and enforce other communication restrictions.
B) They are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
C) They traverse available web links in an attempt to discover documents for indexing and retrieval.
D) They have specific vulnerabilities that attract different varieties of malware in the wild, study their properties, and find out who started them.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.


A) honeypot
B) worm
C) Trojan horse
D) cookie

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

________ is one way of recovering systems in an incidence response plan.


A) Prosecuting the offender for security risk
B) Reevaluating the risk matrix
C) Restricting system access
D) Restoring from media known to be good

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Discuss some of the possible drawbacks of implementing surveillance technologies at workplaces.

Correct Answer

verifed

verified

Though adopting surveillance at workplac...

View Answer

Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her email communications, etc. Data gathered from the monitoring activity is sent to a remotely located hacker. Which of the following is most likely to have infected Evelyn's computer?


A) spyware
B) web crawler
C) black swan
D) firewall

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Discuss how malware and botnets threaten the security of intellectual property.

Correct Answer

verifed

verified

Malware refers to malicious software des...

View Answer

Showing 61 - 80 of 120

Related Exams

Show Answer