Filters
Question type

Study Flashcards

What is spam?


A) A type of encryption
B) A type of content filtering
C) A form of unsolicited email
D) None of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What is a method for confirming users' identities?


A) Authentication
B) Prevention
C) Detection
D) Response

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?


A) Biometrics
B) Encryption
C) Firewalls
D) None of the above

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Obtain ___________ support is the last step for creating an information security plan.

Correct Answer

verifed

verified

Information security policies detail how an organization will implement the information security plan.

A) True
B) False

Correct Answer

verifed

verified

Content filtering, _________, and firewalls are the three types of prevention and resistance technologies.

Correct Answer

verifed

verified

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

A) True
B) False

Correct Answer

verifed

verified

Develop the information security policies is the ________________ step for creating an information security plan.

Correct Answer

verifed

verified

_________ programs are viruses that open a way into the network for future attacks.

Correct Answer

verifed

verified

Which of the following is not considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) None of the above

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

D

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

A) True
B) False

Correct Answer

verifed

verified

False

___________ is a method for confirming users' identities.

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Crackers
D) Cyberterrorists

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.

Correct Answer

verifed

verified

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

Correct Answer

verifed

verified

Who works at the request of the system owners to find system vulnerabilities and plug the holes?


A) White-hat hackers
B) Black-hat hackers
C) Hactivists
D) Script kiddies

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

What attacks computer systems by transmitting a virus hoax, with a real virus attached?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Information security ______________ identify the rules required to maintain information security.

Correct Answer

verifed

verified

Policies

A(n) _________ is software written with malicious intent to cause annoyance or damage.

Correct Answer

verifed

verified

Showing 1 - 20 of 80

Related Exams

Show Answer