Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Business Driven Technology Study Set 4
Quiz 25: Valuing and Storing Organizational Informationdatabases
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
What area of information security focuses on preventing identity theft, phishing, and pharming scams?
Question 42
Multiple Choice
What is an insider?
Question 43
Multiple Choice
Which of the following represents the three areas where technology can aid in the defense against information security attacks?
Question 44
Multiple Choice
Which of the following is an example of a way to maintain information security that a company should include in their information security policies?
Question 45
Multiple Choice
What is dumpster diving?
Question 46
Multiple Choice
Which of the below represents the biggest problem of information security breaches?
Question 47
Multiple Choice
What is a destructive agent?
Question 48
Multiple Choice
Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janet is creating the potential for which type of information security breach to occur?
Question 49
Multiple Choice
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. What type of identity theft were you just a victim of?