Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
A) sniffing.
B) social engineering.
C) phishing.
D) pharming.
Answer: B
Learn More :
MIS Chapter 8
- Smaller firms may outsource some or many security functions to
- The development and use of methods to make computer systems resume their activities more quickly after mishaps is called
- In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
- For 100% availability, online transaction processing requires
- Downtime refers to periods of time in which a
- A digital certificate system
- In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
- Most antivirus software is effective against
- Currently, the protocols used for secure information transfer over the Internet are
- Which of the following is the greatest threat that employees pose to an organization's information systems?
- In which technique are network communications analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
- A firewall allows the organization to
- Which of the following is not a trait used for identification in biometric systems?
- An authentication token is a(n)
- Rigorous password systems
- Which of the following is not one of the main firewall screening techniques?
- A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.
- Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
- ______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
- Application controls
- Electronic evidence on computer storage media that is not visible to the average user is called ________ data.
- The most common type of electronic evidence is
- The Sarbanes-Oxley Act
- The Gramm-Leach-Bliley Act
- The HIPAA Act
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.