Deck 4: Ethics and Information Security: Mis Business Concerns

ملء الشاشة (f)
exit full mode
سؤال
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
سؤال
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.
سؤال
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
سؤال
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
سؤال
Pirated software is software that is manufactured to look like the real thing and sold as such.
سؤال
Information compliance is the act of conforming,acquiescing,or yielding information.
سؤال
A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.
سؤال
Ethics and security are two fundamental building blocks for all organizations.
سؤال
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
سؤال
Information governance is a method or system of government for information management or control.
سؤال
A social media policy outlines the corporate guidelines or principles governing employee online communications.
سؤال
Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
سؤال
Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.
سؤال
Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.
سؤال
Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.
سؤال
An ethical computer use policy contains general principles to guide computer user behavior.
سؤال
An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.
سؤال
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
سؤال
Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.
سؤال
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
سؤال
Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
سؤال
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
سؤال
A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.
سؤال
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
سؤال
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
سؤال
Cyberbullying is an act or object that poses a danger to assets.
سؤال
Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
سؤال
Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
سؤال
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
سؤال
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
سؤال
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
سؤال
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
سؤال
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
سؤال
Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.
سؤال
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
سؤال
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
سؤال
Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.
سؤال
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
سؤال
Cybervandalism is the electronic defacing of an existing website.
سؤال
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
سؤال
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
سؤال
The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.
سؤال
Organizations address security risks through two lines of defense.The first is people and the second is technology.
سؤال
Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.
سؤال
Backdoor programs change their form as they propagate.
سؤال
Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.
سؤال
Information security policies detail how an organization will implement the information security plan.
سؤال
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
سؤال
Backdoor programs open a way into the network for future attacks.
سؤال
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
سؤال
Tokens are small electronic devices that change user passwords automatically.
سؤال
A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.
سؤال
Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
سؤال
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
سؤال
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
سؤال
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
سؤال
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
سؤال
Script-kiddies have criminal intent when hacking.
سؤال
The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.
سؤال
A certificate authority is a trusted third party,such as VeriSign,that validates user identities by means of digital certificates.
سؤال
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
سؤال
Which of the following represents the two fundamental building blocks that protect organizational information?

A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
سؤال
Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
سؤال
Phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username,password,and sometimes credit card information.
سؤال
A zombie farm is a group of computers on which a hacker has planted zombie programs.
سؤال
Identity theft is the forging of someone's identity for the purpose of fraud.
سؤال
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
سؤال
Phishing reroutes requests for legitimate websites to false websites.
سؤال
Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.
سؤال
Worms are computer viruses that wait for a specific date before executing their instructions.
سؤال
Trust between companies,customers,partners,and suppliers are the support structure of which of the following?

A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
سؤال
Decrypt information is to decode it and is the opposite of encrypt.
سؤال
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
سؤال
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
سؤال
A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.
سؤال
What is the legal protection afforded an expression of an idea,such as a song,book,or video game?

A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
سؤال
Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
سؤال
A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
سؤال
Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/344
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Ethics and Information Security: Mis Business Concerns
1
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
True
Explanation: Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
2
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
True
Explanation: The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
3
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.
True
Explanation: Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents
4
Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
5
Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
6
Pirated software is software that is manufactured to look like the real thing and sold as such.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
7
Information compliance is the act of conforming,acquiescing,or yielding information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
8
A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
9
Ethics and security are two fundamental building blocks for all organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
10
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
11
Information governance is a method or system of government for information management or control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
12
A social media policy outlines the corporate guidelines or principles governing employee online communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
13
Digital rights management is a technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
14
Counterfeit software is the unauthorized use,duplication,distribution,or sale of copyrighted software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
15
Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
16
Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
17
An ethical computer use policy contains general principles to guide computer user behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
18
An acceptable use policy (AUP)requires a user to agree to follow it to be provided access to corporate email,information systems,and the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
19
Companies do not need a privacy policy for email because an employee's work email is private and cannot be viewed by the company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
20
Privacy is the legal protection afforded an expression of an idea,such as a song,book,or video game.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
21
Competitive click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
22
Internet governance is government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
23
White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
24
A hacker weapon called a splog (spam blog)is a fake blog created solely to raise the search engine rank of affiliated websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
25
Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
26
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
27
Cyberbullying is an act or object that poses a danger to assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
28
Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
29
Click-fraud is the abuse of pay-per-click,pay-per-call,and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
30
Smoking areas are targeted by hackers as they regularly use smoking entrances to gain building access where they pose as employees to gain access to the company network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
31
Workplace MIS monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
32
Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
33
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
34
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
35
Cybervandalism includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
36
Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
37
Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
38
Spyware is software that,while purporting to serve some useful function and often fulfilling that functions,also allows Internet advertisers to display advertisements without the consent of the computer user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
39
Teergrubing is an antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
40
Cybervandalism is the electronic defacing of an existing website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
41
One of the most ineffective ways to set up authentication techniques is by setting up user IDs and passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
42
Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
43
The three primary information security areas are 1) authentication and authorization, 2) policies and rewards, and 3) detection and response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
44
Organizations address security risks through two lines of defense.The first is people and the second is technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
45
Denial-of-service attack (DoS)floods a website with so many requests for service that it slows down or crashes the site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
46
Backdoor programs change their form as they propagate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
47
Through social engineering,hackers use their social skills to trick people into revealing access credentials or other valuable information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
48
Information security policies detail how an organization will implement the information security plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
49
Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
50
Backdoor programs open a way into the network for future attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
51
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
52
Tokens are small electronic devices that change user passwords automatically.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
53
A process of providing a user with permission including access levels and abilities such as file access,hours of access,and amount of allocated storage space is called authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
54
Worm spreads itself,not only from file to file,but also from computer to computer.The primary difference between a virus and a worm is that a virus must attach to something,such as an executable file,to spread.Worms do not need to attach to anything to spread and can tunnel themselves into computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
55
White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
56
Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
57
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
58
Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
59
Script-kiddies have criminal intent when hacking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
60
The technique to gain personal information for the purpose of identity theft,often through fraudulent emails that look as though they came from legitimate businesses is called phishing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
61
A certificate authority is a trusted third party,such as VeriSign,that validates user identities by means of digital certificates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

A)Intellectual software
B)Intellectual property
C)Trademark property
D)Ethical property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following represents the two fundamental building blocks that protect organizational information?

A)Security and sales
B)Human resources and security
C)Ethics and security
D)Ethics and technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
64
Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
65
Phishing expedition is a masquerading attack that combines spam with spoofing.The perpetrator sends millions of spam emails that appear to be from a respectable company.The emails contain a link to a website that is designed to look exactly like the company's website.The victim is encouraged to enter his or her username,password,and sometimes credit card information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
66
A zombie farm is a group of computers on which a hacker has planted zombie programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
67
Identity theft is the forging of someone's identity for the purpose of fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
68
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
69
Phishing reroutes requests for legitimate websites to false websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
70
Cryptography is the science that studies encryption,which is the hiding of messages so that only the sender and receiver can read them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
71
Worms are computer viruses that wait for a specific date before executing their instructions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
72
Trust between companies,customers,partners,and suppliers are the support structure of which of the following?

A)Ebusiness
B)Eharmony
C)Esoftware
D)Epolicies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
73
Decrypt information is to decode it and is the opposite of encrypt.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
74
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
75
A firewall scrambles information into an alternative form that requires a key or password to decrypt.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
76
A pharming attack uses of a zombie farm,often by an organized crime association,to launch a massive phishing attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
77
What is the legal protection afforded an expression of an idea,such as a song,book,or video game?

A)Privacy
B)Confidentiality
C)Intellectual property
D)Copyright
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
78
Spear phishing is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
79
A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
80
Biometrics is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 344 في هذه المجموعة.