Business Driven Technology Study Set 2

Business

Quiz 25 :
B: Extension: A Information Security

Quiz 25 :
B: Extension: A Information Security

Showing 1 - 20 of 113
Next Quiz
arrow
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
Free
True False
Answer:

Answer:

True

arrow
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
Free
True False
Answer:

Answer:

False

arrow
Information security policies detail how an organization will implement the information security plan.
Free
True False
Answer:

Answer:

False

arrow
Dumpster diving, another security breach for companies, occurs when people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
True False
Answer:
arrow
Organizations address security risks through two lines of defense.The first is people and the second is technology.
True False
Answer:
arrow
Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual.
True False
Answer:
arrow
Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.
True False
Answer:
arrow
Through social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.
True False
Answer:
arrow
Through pretexting, hackers use their social skills to trick people into revealing access credentials or other valuable information.
True False
Answer:
arrow
The three primary information security areas are (1) authentication and authorization, (2) policies and rewards, and (3) detection and response.
True False
Answer:
arrow
Tokens are small electronic devices that change user passwords automatically.
True False
Answer:
arrow
The technique to gain personal information for the purpose of identity theft, often through fraudulent emails that look as though they came from legitimate businesses, is called phishing.
True False
Answer:
arrow
A process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space is called authentication.
True False
Answer:
arrow
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
True False
Answer:
arrow
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
True False
Answer:
arrow
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
True False
Answer:
arrow
Identity theft is the forging of someone's identity for the purpose of fraud.
True False
Answer:
arrow
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
True False
Answer:
arrow
A phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username, password, and sometimes credit card information.
True False
Answer:
arrow
Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
True False
Answer:
Showing 1 - 20 of 113
Next Quiz