IS3445 CHAP 4 FROM PERSON COMMUNICATION TO SOCIAL NETWORKING Flashcards Preview

IS3445 SEC WEB APPS > IS3445 CHAP 4 FROM PERSON COMMUNICATION TO SOCIAL NETWORKING > Flashcards

Flashcards in IS3445 CHAP 4 FROM PERSON COMMUNICATION TO SOCIAL NETWORKING Deck (21)
Loading flashcards...
1
Q

___ is and execution of a plan to bypass security of systems and gain unauthorized access to a resource.

A

Attack

2
Q

___ This is an email sent to one or more recipients part from the primary. Originally, named when a carbon paper was used to make a copy.

A

(CC) Carbon Copy

3
Q

___ is a program that can identify a potentially risky email and stop it from reaching the end user.

A

Email filtering software

4
Q

___ is software designed to damage or disrupt the operation of a system, such as a Trojan horse, worm, or virus.

A

Malware

5
Q

___ is a form of blogging using limited content, such as Twitter.

A

Microblogging

6
Q

___ is a scam in which an imposter pretends to be a legitimate entity and tries to lure customers into divulging confidential information.

A

Phishing

7
Q

___ is a type of computer security that includes tangible protection devices.

A

Physical security

8
Q

___ is a source of danger, exposure to unauthorized use or compromise.

A

Risk

9
Q

___ is protection from inadvertent information disclosure.

A

Secrecy

10
Q

___ is the unauthorized use of goods or services.

A

Theft

11
Q
  1. Retrieving data from old hard disks is a form of social networking.
    TRUE OR FALSE
A

FALSE

12
Q
  1. Which of the following are advantages of email? (Select two)
  2. Filtering
  3. Archiving
  4. Real-time communications
  5. Protection from social engineering attacks
A
  1. Filtering

2. Archiving

13
Q
  1. Several people in your company have received emails suggesting that their PayPal accounts have been changed and they need to follow a link to reset their accounts. This is an example of which of the following?
  2. Phishing
  3. Social engineering
  4. Email filtering
  5. Email viral transmission
A

Phishing

14
Q
  1. While standing behind an employee, an intruder was able to see and obtain her password. What has occurred in this situation?
  2. Social engineering
  3. Eye pathing
  4. Shoulder surfing
  5. Impersonation
A

.

15
Q
  1. After a devastating flood, you receive an email asking for donations. What type of attack might this be?
  2. Social networking
  3. Social engineering
  4. Phishing
  5. Intimidation
A

Social engineering

16
Q
  1. ___ helps determine the areas visitors commonly see first on a Web site.
A

Eye tracking or eye pathing

17
Q
  1. You can enhance SEO marketing by using a forum on your Web site.
    TRUE OR FALSE
A

TRUE

18
Q
  1. ___ refers to the style of writing presented in small paragraphs rather than in long columns of text.
A

Chunking

19
Q
  1. A ___ scam typically involves an impostor who pretends to be a legitimate entity and tries to coax customers into divulging private financial information.
A

Phishing

20
Q
  1. Which of the following are advantages companies get from using forums? (Select two)
  2. Prevent online scams
  3. Encourage repeat visitors
  4. Provide support from fellow users’ experience and expertise
  5. Help to identify hackers
A

Encourage repeat visitors

3. Provide support from fellow users’ experience and expertise

21
Q
  1. The fold is the area a visitor first sees when visiting a Web site.
    TRUE OR FALSE
A

TRUE