Add to folder Introducing Folders! Find out exactly how you deserve to intelligently organize your Flashcards.

You are watching: Phishing is a technique for intercepting computer communications.


Use LEFT and RIGHT arrowhead secrets to navigate between flashcards;

Use UP and also DOWN arrowhead keys to flip the card;

H to show hint;

A reads message to speech;


When someone pretends to be a legitimate agency and also sends out an e-mail requesting confidential data, such as crmodify card numbers, this is known as ________.

. hawking

. spoofing

. phishing

. sniffing

A subversive technique for intercepting computer interactions is ________.

. sniffing

. spoofing

. phishing

. pretexting

________ is a term for when someone reasons deception by pretending to be someone else.

. Hacking

. Pretexting

. Sniffing

. Phishing

________ intercept wiremuch less traffic at will in areas wbelow individuals are on gadgets via wiremuch less internet relationships on unprotected netfunctions.

. Drive-by spoofers

. Drive-by pretexters

. Drive-by phishers

. Drive-by sniffers

When a person gains unauthorized accessibility to a computer system device, he or she is said to be ________.

. hacking

. phishing

. sniffing

. spoofing

________ current the biggest risk for framework loss.

. Thefts

. Terror assaults

. Human being mistakes

. Natural calamities

Which of the following exemplifies a technological safeguard?

. authentication

. key escrow

. helpdesk policies

. password management

Which of the adhering to is an example of a huguy safeguard?

. password management

. digital signatures

. botnets

. authentication

Which of the complying with is NOT an example of a file safeguard?

. storage in an encrypted form


. vital escrow

. physical security

A protection policy concerning the use of computers at work for individual company would be an instance of a ________.

. system-specific policy

. information policy

. issue-particular policy

. human-resources policy

A security plan determining which customer information from the order entry mechanism will be common through various other companies is an example of a ________ policy.

. system-specific

. data

. issue-specific

. human-resources

The term ________ describes hazards and also consequences that we understand around.

. understanding

. hedge

. risk

. indemnity

________ is the first step in threat administration.

. Evaluating the results of the hazard management process

. Reducing the likelihood of a threat

. Assessing the threats

. Creating perfect hedges to reduce the risks

________ describes the probcapacity that a given ascollection will be jeopardized by a provided hazard, despite the safeguards.

. Likelihood

. Uncertainty

. Consequence

. Vulnercapability

Which of the adhering to is NOT a factor for public suppliers to develop and follow a disaster recoexceptionally plan?

. requirement to execute so

. good administration practice

. minimization of organizational interruption

. avoidance of data theft

Due to the fact that no safeguard is ironclad, there is always a ________ danger that the safeguard will not safeguard the assets in all scenarios.

. residual

. diversifiable

. portfolio

. procedure

________ describes the recording and evaluation of keystrokes.

. Theft

. Eavesdropping

. Hacking

. Sniffing

A important security feature that requires the involvement of senior-management is ________.

. safeguarding computer system hardware and also software

. planning responses to protection occurrences

. establishing the security policy

. managing the security program on a real-time basis

Which of the following is NOT a form of data which should be backed up by IT staff?

. account data

. data on employees" computers

. webwebsite resources

. databases

Which of the complying with mindsets about backing up user computer systems will certainly many often prevent data loss occurrences?

. Backups need to be perdeveloped ideal prior to traveling in situation a lappeak is stolen or damaged.

. File have to be backed up at the exact same time each week.

. Backups are many important once you are not planning to use the computer for a couple of days.

. Users need to follow a setup so that in the event of loss or system faientice, all instrumental data are obtainable and also uncompromised.

See more: Nail Polish By Smith And Cult Dark Like Me, Smith & Cult Dark Like Me Nail Polish

. Users must follow a arrangement so that in the event of loss or device failure, all crucial data are accessible and unjeopardized.

* has actually partnered through the National Tutoring Association Claim your access
"cdnAssetsUrl":"","site_dot_caption":"","premium_user":false,"premium_set":true,"payreferer":"clone_set","payreferer_set_title":"Quiz 12","payreferer_url":"/flashcards/copy/quiz-12-7421055","isGuest":true,"ga_id":"UA-272909-1","facebook":"clientId":"363499237066029","version":"v2.9","language":"en_US"