29 Questions
What type of malware is designed to trick victims into giving up personal information to purchase or download useless software?
Scareware
Which security threat involves forging the return email address to mask the actual sender?
Spoofing
What type of adware collects user data and transmits it without permission?
Spyware
Which malware is a form of malicious software that demands money after infecting a computer?
Ransomware
What should organizations develop to outline the rules required for maintaining information security?
Information security policies
Which program or device can monitor data transmitted over a network?
Sniffer
What is the term used for the process of confirming users' identities?
Authentication
Which technique involves rerouting requests for legitimate websites to false websites?
Pharming
What type of authentication technique involves using fingerprints or voice?
Something that is part of the user
What is the purpose of astroturfing in the context of security?
To artificially stimulate demand for a product
What role do tokens play in authentication?
Changing user passwords automatically
Which category of authentication techniques includes a smart card or token?
Something the user has
What type of attack involves attackers granting themselves a higher access level to the network?
Vertical privilege escalation
Which technology scrambles information into an alternative form that requires a key or password to decrypt?
Encryption
What type of prevention technology filters content to prevent the transmission of unauthorized information?
Content filtering
In which situation would horizontal privilege escalation occur?
When attackers grant themselves the same access levels but assume another user's identity
What is the purpose of intrusion detection software?
To monitor network traffic for suspicious patterns
Which technology is used to guard a private network by analyzing incoming and outgoing information for correct markings?
Firewalls
What is a recommended way to obscure your email address when posting to a web forum or newsgroup?
Insert something obvious into your email address
Why is it advised not to reply to spam messages?
To confirm that your email address is active
What is one reason given to remove your email address from your website's pages?
To prevent spammers' robots from collecting your email address
What action can help in avoiding ending up on a spammer's mailing list?
Offering a web-based mail form instead of displaying your email address
What risk does replying to spam messages pose?
Providing spammers with active email addresses
What is the main focus of information ethics?
Moral issues arising from information technologies
Which of the following is NOT a tool to prevent information misuse as mentioned in the text?
Information ethics
What is the main difference between privacy and confidentiality as explained in the text?
Privacy involves control over personal possessions, while confidentiality ensures authorized viewing of information.
What is the purpose of an Ethical Computer Use Policy according to the text?
To guide user behavior based on ethical principles
Which of the following is NOT a business issue related to information ethics mentioned in the text?
Privacy
What is the key aspect that organizations aim for regarding ePolicies based on the text?
Building a corporate culture based on ethical principles
Explore the ethical principles and standards that guide behavior in information ethics, particularly in the context of information technologies and business practices. Learn about important issues like intellectual property, copyright, pirated and counterfeit software, and digital rights management.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free