Exam 25: Valuing and Storing Organizational Informationdatabases

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?

(Multiple Choice)
4.9/5
(37)

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches?

(Multiple Choice)
4.9/5
(46)

What is a method for confirming users' identities?

(Multiple Choice)
4.8/5
(40)

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

(Multiple Choice)
4.8/5
(39)

What is phishing?

(Multiple Choice)
4.7/5
(28)

What prevention technique scrambles information into an alternative form that requires a key or password to decrypt?

(Multiple Choice)
4.8/5
(25)

What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

(Multiple Choice)
4.9/5
(41)

What is the traditional security process, which requires a username and password?

(Multiple Choice)
4.8/5
(38)

What are biometrics?

(Multiple Choice)
4.8/5
(38)

Which of the following is the main drawback of biometrics?

(Multiple Choice)
4.7/5
(38)

A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration of a speaker's mouth and throat, can be expressed as a mathematical formula. Unfortunately, biometric authentication such as voiceprints can be costly and intrusive.

(True/False)
4.8/5
(28)

A pharming attack uses of a zombie farm, often by an organized crime association, to launch a massive phishing attack.

(True/False)
4.9/5
(32)

What is the difference between phishing and pharming?

(Multiple Choice)
4.8/5
(33)
Showing 101 - 113 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)