IS3445 CHAP 4 FROM PERSON COMMUNICATION TO SOCIAL NETWORKING Flashcards

1
Q

___ is and execution of a plan to bypass security of systems and gain unauthorized access to a resource.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ This is an email sent to one or more recipients part from the primary. Originally, named when a carbon paper was used to make a copy.

A

(CC) Carbon Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is a program that can identify a potentially risky email and stop it from reaching the end user.

A

Email filtering software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is software designed to damage or disrupt the operation of a system, such as a Trojan horse, worm, or virus.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is a form of blogging using limited content, such as Twitter.

A

Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is a scam in which an imposter pretends to be a legitimate entity and tries to lure customers into divulging confidential information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ is a type of computer security that includes tangible protection devices.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is a source of danger, exposure to unauthorized use or compromise.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is protection from inadvertent information disclosure.

A

Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is the unauthorized use of goods or services.

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Retrieving data from old hard disks is a form of social networking.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following are advantages of email? (Select two)
  2. Filtering
  3. Archiving
  4. Real-time communications
  5. Protection from social engineering attacks
A
  1. Filtering

2. Archiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Several people in your company have received emails suggesting that their PayPal accounts have been changed and they need to follow a link to reset their accounts. This is an example of which of the following?
  2. Phishing
  3. Social engineering
  4. Email filtering
  5. Email viral transmission
A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. While standing behind an employee, an intruder was able to see and obtain her password. What has occurred in this situation?
  2. Social engineering
  3. Eye pathing
  4. Shoulder surfing
  5. Impersonation
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. After a devastating flood, you receive an email asking for donations. What type of attack might this be?
  2. Social networking
  3. Social engineering
  4. Phishing
  5. Intimidation
A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. ___ helps determine the areas visitors commonly see first on a Web site.
A

Eye tracking or eye pathing

17
Q
  1. You can enhance SEO marketing by using a forum on your Web site.
    TRUE OR FALSE
A

TRUE

18
Q
  1. ___ refers to the style of writing presented in small paragraphs rather than in long columns of text.
A

Chunking

19
Q
  1. A ___ scam typically involves an impostor who pretends to be a legitimate entity and tries to coax customers into divulging private financial information.
A

Phishing

20
Q
  1. Which of the following are advantages companies get from using forums? (Select two)
  2. Prevent online scams
  3. Encourage repeat visitors
  4. Provide support from fellow users’ experience and expertise
  5. Help to identify hackers
A

Encourage repeat visitors

3. Provide support from fellow users’ experience and expertise

21
Q
  1. The fold is the area a visitor first sees when visiting a Web site.
    TRUE OR FALSE
A

TRUE