Which of the following is not a common approach to phishing?
a. Send an official‐looking e‐mail asking for confidential information
b. Ask people to fill out and return a fake letter using postal mail
c. Ask people to click a link in an e‐mail to open a submission form on a web page
d. All of the above are uncommon approaches to phishing

1 Answer

Answer :

b. Ask people to fill out and return a fake letter using postal mail

Related questions

Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above

Last Answer : d. All the above

Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above

Last Answer : a. Hacking

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : “““.are 'attempts by individuals toobtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above

Last Answer : Phishing

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams

Last Answer : 4) Phishing Scams

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams

Last Answer : 4 Phishing Scams

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above

Last Answer : b. Click‐through

Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above

Last Answer : d. All the above

Description : What type of ad appears under a web page? a. pop‐under ad b. pop‐up ad c. banner ad d. discount ad

Last Answer : a. pop‐under ad

Description : What type of ad appears on top of a web page? a. pop‐under ad b. pop‐up ad c. banner ad d. discount ad

Last Answer : b. pop‐up ad

Description : Which type of add appears on a web page? a. pop‐under ad b. Pop‐up ad c. Banner ad d. Discount ad

Last Answer : c. Banner ad

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware

Last Answer : a. Key logger software

Description : Which e‐government arena is being used when governmental agencies send out and accept bids for work? a) G2G b) G2B c) G2C d) G2G

Last Answer : b) G2B

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : In simple terms, what does risk assessment ask? a. What can go wrong? b. How likely is it to go wrong? c. What are the possible consequences if it does go wrong? d. All of the above

Last Answer : d. All of the above

Description : Mark correct option related to official postal articles a) The rules relating to private correspondence apply equally to official postal article b) Service stamps can be used for prepayin outward official foreign ... means of service stamps c) All of above are correct d) None of these are correct

Last Answer : c) All of above are correct

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : How the transactions occur in e‐commerce? a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above

Last Answer : a. Using e‐medias

Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers

Last Answer : b. People

Description : How do I open media files using the same program each time without having to use the "open as" right-click link on windows xp?

Last Answer : answer:right-click and click on open with and make sure you choose the option that says choose program at the bottom of the list there should be a check box for always use this program. what program are ... in Windows Media Player, if you go to Tools and then Options there is a tab for File Types.

Description : How do you check the link you posted in your email before you click Send?

Last Answer : Copy and paste it into your browser. If it goes through, the link the recipient gets will work.

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies

Last Answer : a. Hackers

Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : c. Reliability

Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : b. Accessibility

Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : d. Disaster recovery cost curve

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet