Filters
Question type

Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.


A) hacking
B) sniffing
C) data mining
D) phishing

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments.


A) advanced persistent threat
B) identity threat
C) copyright theft
D) network sniffer attack

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Describe how a computer may show signs of spyware and/or adware symptoms.

Correct Answer

verifed

verified

Answers may vary.
• Slow system startup
...

View Answer

Which of the following statements is TRUE of the financial losses due to computer crimes?


A) All studies on the costs of computer crimes are based on surveys.
B) There are several set standards for tallying computer crime costs and financial losses.
C) Companies are legally required to calculate their financial losses due to computer crime every month.
D) Knowledge about the cost of computer crimes is restricted to large companies.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Explain the functions performed by packet-filtering firewalls.

Correct Answer

verifed

verified

A packet-filtering firewall examines eac...

View Answer

Explain the types of events that result in faulty service, a type of security loss.

Correct Answer

verifed

verified

Faulty service includes problems that re...

View Answer

________ is a technique for intercepting computer communications.


A) Spoofing
B) Phishing
C) Pretexting
D) Sniffing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Most secure communications over the Internet use a protocol called ________.


A) smtp
B) ftp
C) https
D) nntp

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Smart cards are convenient to use because they do not require a personal identification number for authentication.

A) True
B) False

Correct Answer

verifed

verified

What is one of the drawbacks of removing and disabling cookies?


A) Hackers will have increased access to data on the computer.
B) It will slow down the process of loading websites on your computer.
C) Your computer will be harder to use.
D) You will not have to sign in every time you visit a website.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is a task for the system user during the recovery system procedure?


A) Prepare for the loss of system functionality.
B) Recover systems from the backed-up data.
C) Accomplish job tasks during failure.
D) Operate data center equipment.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.


A) hacking
B) data mining
C) pretexting
D) sniffing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Explain the concept of denial of service (DOS) in information management.

Correct Answer

verifed

verified

Human errors in a procedure or a lack of...

View Answer

In terms of password management, when an account is created, users should ________.


A) create two passwords and switch back and forth between the two
B) immediately change the password they are given to a password of their own
C) maintain the same password they are given for all future authentication purposes
D) ensure that they do not change their passwords frequently to reduce the risk of password theft

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is the most expensive consequence of computer crime?


A) information loss
B) business disruption
C) equipment losses and damage
D) recovery

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage.

A) True
B) False

Correct Answer

verifed

verified

Pretexting occurs when someone deceives by pretending to be someone else.

A) True
B) False

Correct Answer

verifed

verified

Malware definitions are patterns that exist in malware code.

A) True
B) False

Correct Answer

verifed

verified

A user name authenticates a user, and a password identifies that user.

A) True
B) False

Correct Answer

verifed

verified

Wardrivers are those who engage in phishing to obtain unauthorized access to data.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 118

Related Exams

Show Answer