Spyware Can Result In All Of The Following Except

Question:

Answer: Using a cell phone to discuss sensitive information.

Question:

Answer: E. All of the above

Question: Edna wants to create a strong password. She should avoid all of the following EXCEPT:

Answer: B. Special characters

Question: For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following EXCEPT:

Answer: A. Secret information

Question: Ken received an unencrypted email from a colleague named Barbie that contained a driver’s license image of an individual requesting assistance. Is this considered PII?

Answer: A. Yes

Question: Within the context of information systems, an insider threat is any person without legitimate physical or administrative access to an information system who can misuse or exploit its weaknesses.

Answer: A. FALSE

Question: Agnes wants to make sure she knows which steps to take to avoid spillage. You advise Agnes to do all of the following EXCEPT:

Answer: B. Store classified data on her Smart Phone when traveling.

Question: Jacob collects movies. He found a way to get movies at no cost using a service where he shares his computer’s content with other users. He sets up his work computer to use this service. This is an example of the following vulnerability:

Answer: C. Peer-to-peer technology

Question: Which of the following will help reduce your risk of identity theft when engaging in e-commerce?

Answer: C. Confirm the site you are using uses an encrypted link.

Question: Which of the following vulnerabilities is most likely to be exploited by an external threat to the infrastructure?

Answer: D. Software flaws

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.