IS3445 CHAP 4 FROM PERSON COMMUNICATION TO SOCIAL NETWORKING Flashcards
___ is and execution of a plan to bypass security of systems and gain unauthorized access to a resource.
Attack
___ This is an email sent to one or more recipients part from the primary. Originally, named when a carbon paper was used to make a copy.
(CC) Carbon Copy
___ is a program that can identify a potentially risky email and stop it from reaching the end user.
Email filtering software
___ is software designed to damage or disrupt the operation of a system, such as a Trojan horse, worm, or virus.
Malware
___ is a form of blogging using limited content, such as Twitter.
Microblogging
___ is a scam in which an imposter pretends to be a legitimate entity and tries to lure customers into divulging confidential information.
Phishing
___ is a type of computer security that includes tangible protection devices.
Physical security
___ is a source of danger, exposure to unauthorized use or compromise.
Risk
___ is protection from inadvertent information disclosure.
Secrecy
___ is the unauthorized use of goods or services.
Theft
- Retrieving data from old hard disks is a form of social networking.
TRUE OR FALSE
FALSE
- Which of the following are advantages of email? (Select two)
- Filtering
- Archiving
- Real-time communications
- Protection from social engineering attacks
- Filtering
2. Archiving
- Several people in your company have received emails suggesting that their PayPal accounts have been changed and they need to follow a link to reset their accounts. This is an example of which of the following?
- Phishing
- Social engineering
- Email filtering
- Email viral transmission
Phishing
- While standing behind an employee, an intruder was able to see and obtain her password. What has occurred in this situation?
- Social engineering
- Eye pathing
- Shoulder surfing
- Impersonation
.
- After a devastating flood, you receive an email asking for donations. What type of attack might this be?
- Social networking
- Social engineering
- Phishing
- Intimidation
Social engineering