Question: 1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise that the baiter gives to the recipient. True
1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise that the baiter gives to the recipient. True or False?
2. Tailgating or "piggybacking" takes place when an unauthorized person follows an employee into a restricted area for example an individual impersonates a help desk employee. True or False?
3. Asymmetric encryption uses one key. True or False?
4. E-commerce transaction security is concerned with all of the following issues except:
a. Use of a firewall
b. Confidentiality
c. Authentication
d. Non repudiation of origin
5. All of the following are a part of a comprehensive security system except:
a. Raise employees' awareness of security problems.
b. Install software patches and updates on operating systems on a regular basis
c. Limit computer access to authorized personnel only
d. Do not post the security policy in a visible place
6. All of the following are among the techniques used by social engineers except:
a. Dumpster diving
b. Tailgating
c. Continuity planning
d. Pre-texting
Step by Step Solution
3.31 Rating (172 Votes )
There are 3 Steps involved in it
1 True ... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
1452-C-S-I-S(1493).docx
120 KBs Word File
