91) Adopting which among the following measures makes it most difficult for a hacker to break into passwords?
A) creating easy to remember passwords
B) reusing the password in news and games sites through multiple systems
C) maintaining a single, secure password for all accounts
D) creating passwords with symbols, mixed cases, and characters
92) ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to multiple software applications.
A) Single sign-on
B) Canonical account
C) Pre-shared key
D) Shadow password
93) Which of the following precautions need to be taken in order to create a secure password?
A) Personal information should not be used in passwords.
B) Consistently similar character types should be used.
C) A single, memorizable password should be used for all logins.
D) Passwords should be changed infrequently.
94) Single sign-on is implemented by organizations for the purpose of ________.
A) ensuring that a single password can be used to securely access multiple accounts any number of times
B) reducing the cognitive load associated with multiple passwords
C) helping a user sign on through the process of fingerprint identification
D) defining which IP addresses and domain names can be accessed from an organization’s computers
95) ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
A) Password mungeing
B) Shouldersurfing
C) Social engineering
D) Astroturfing
96) Which of the following is a reason why humans are soft targets for social engineering?
A) need for anonymity
B) respect for authority
C) need for privacy
D) desire to be disconnected from others
97) Which of the following is an accurate definition of scareware?
A) It is a kind of anti-spam process which relies on human desire to use malware.
B) It is a kind of social engineering used to scare users with malicious software.
C) It is type of software that prevents users from downloading malware by displaying warnings.
D) It is a software which provides a shield against spam and mirrors it back into the network.
98) Which of the following laws prohibits businesses from sending misleading or deceptive commercial e-mails but denies recipients any legal recourse on their own?
A) CAN-SPAM Act
B) Gramm-Leach-Bliley Act
C) European Union’s Data Protection Directive
D) State Security Breach Notification Law
99) Which of the following is a provision of the State Security Breach Notification Laws?
A) They require organizations to inform state residents if sensitive data are released.
B) They require companies to provide “opt-out” choices before transferring personal data to third parties.
C) They prohibit businesses from sending misleading or deceptive commercial e-mails.
D) They include provisions to protect the privacy and security of individually identifiable health information.
100) Which of the following provisions does the Gramm-Leach-Bliley Act make?
A) limiting the disclosure of personally identifiable information that is maintained by state departments of motor vehicles
B) stipulating how financial institutions are required to protect the privacy of consumers’ financial information and notifying them of their privacy policies
C) prohibiting businesses from sending misleading or deceptive commercial e-mails but denying recipients any legal recourse on their own
D) establishing provisions to protect the privacy and security of individually identifiable health information
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more