A) Social media monitoring
B) Social media manager
C) Social media policy
D) Information privacy manager
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Network behavior analysis.
B) Cyber-vigilantes
C) Cyberterrorism
D) Cyber-espionage
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The traditional security process, which requires a user name and password.
B) Requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token) .
C) Requires more than two means of authentication such as what the user knows (password) , what the user has (security token) , and what the user is (biometric verification) .
D) The identification of a user based on physical characteristic such as a fingerprint, iris, face, voice or handwriting.
Correct Answer
verified
Multiple Choice
A) Social engineering
B) Social media
C) Social viruses
D) Social processes
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information codes
B) Information management
C) Information deployment
D) Information security
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Time bomb
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Striker bunny
B) Dumpster diving
C) Trash retrieval
D) Approved consent
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
Correct Answer
verified
Showing 301 - 320 of 354
Related Exams