A) online identity theft
B) embezzlement
C) shadowing
D) plagiarism
Correct Answer
verified
Multiple Choice
A) Personal information should not be used in passwords.
B) Consistently similar character types should be used.
C) A single, memorable password should be used for all logins.
D) Passwords should rarely be changed.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The information system enforces approved authorizations for access to the system.
B) The information system enforces the organization's policy about human review.
C) The information system automatically disables accounts after a time period defined by the organization.
D) The information system defines the information to be encrypted or stored offline in a secure location.
Correct Answer
verified
Multiple Choice
A) Immovable property
B) Freehold property
C) Intellectual property
D) Public property
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) email program created not for communication but to lure spam
B) software program that attracts malicious attacks in order to study their properties and origins
C) self-replicating program that sends copies to other nodes on a computer network
D) software tool used to inspect incoming and outgoing traffic to a computer network
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) captive portal
B) proxy
C) firewall
D) keylogger
Correct Answer
verified
Multiple Choice
A) It uses a single point key to encrypt and decrypt data.
B) It uses a pair of keys, one to encrypt the data and the other to decrypt data.
C) It uses multiple numbers of keys accessible to all members of an organization.
D) It uses a duplication process to replicate keys.
Correct Answer
verified
Multiple Choice
A) risk matrix
B) incidence response plan
C) public key encryption scheme
D) social engineering plan
Correct Answer
verified
Multiple Choice
A) need for anonymity
B) respect for authority
C) need for privacy
D) desire to be disconnected from others
Correct Answer
verified
Multiple Choice
A) expert systems
B) web crawlers
C) honeypots
D) server farms
Correct Answer
verified
Multiple Choice
A) They deny the entry or exit of specific IP addresses, products, Internet domains, and enforce other communication restrictions.
B) They are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
C) They traverse available web links in an attempt to discover documents for indexing and retrieval.
D) They have specific vulnerabilities that attract different varieties of malware in the wild, study their properties, and find out who started them.
Correct Answer
verified
Multiple Choice
A) honeypot
B) worm
C) Trojan horse
D) cookie
Correct Answer
verified
Multiple Choice
A) Prosecuting the offender for security risk
B) Reevaluating the risk matrix
C) Restricting system access
D) Restoring from media known to be good
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) spyware
B) web crawler
C) black swan
D) firewall
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Showing 61 - 80 of 120
Related Exams