Spyware Can Result In All Of The Following Except
Question:
Answer: Using a cell phone to discuss sensitive information.
Question:
Answer: E. All of the above
Question: Edna wants to create a strong password. She should avoid all of the following EXCEPT:
Answer: B. Special characters
Question: For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following EXCEPT:
Answer: A. Secret information
Question: Ken received an unencrypted email from a colleague named Barbie that contained a driver’s license image of an individual requesting assistance. Is this considered PII?
Answer: A. Yes
Question: Within the context of information systems, an insider threat is any person without legitimate physical or administrative access to an information system who can misuse or exploit its weaknesses.
Answer: A. FALSE
Question: Agnes wants to make sure she knows which steps to take to avoid spillage. You advise Agnes to do all of the following EXCEPT:
Answer: B. Store classified data on her Smart Phone when traveling.
Question: Jacob collects movies. He found a way to get movies at no cost using a service where he shares his computer’s content with other users. He sets up his work computer to use this service. This is an example of the following vulnerability:
Answer: C. Peer-to-peer technology
Question: Which of the following will help reduce your risk of identity theft when engaging in e-commerce?
Answer: C. Confirm the site you are using uses an encrypted link.
Question: Which of the following vulnerabilities is most likely to be exploited by an external threat to the infrastructure?
Answer: D. Software flaws