Question: 1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise that the baiter gives to the recipient. True

1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise that the baiter gives to the recipient. True or False?
2. Tailgating or "piggybacking" takes place when an unauthorized person follows an employee into a restricted area for example an individual impersonates a help desk employee. True or False?
3. Asymmetric encryption uses one key. True or False?
4. E-commerce transaction security is concerned with all of the following issues except:
a. Use of a firewall
b. Confidentiality
c. Authentication
d. Non repudiation of origin
5. All of the following are a part of a comprehensive security system except:
a. Raise employees' awareness of security problems.
b. Install software patches and updates on operating systems on a regular basis
c. Limit computer access to authorized personnel only
d. Do not post the security policy in a visible place
6. All of the following are among the techniques used by social engineers except:
a. Dumpster diving
b. Tailgating
c. Continuity planning
d. Pre-texting

Step by Step Solution

3.31 Rating (172 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

1 True ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

1452-C-S-I-S(1493).docx

120 KBs Word File

Students Have Also Explored These Related Information systems Questions!