1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise...

Question:

1. Baiting is in similar to phishing attacks. However, what distinguishes it from phishing is the promise that the baiter gives to the recipient. True or False?
2. Tailgating or "piggybacking" takes place when an unauthorized person follows an employee into a restricted area for example an individual impersonates a help desk employee. True or False?
3. Asymmetric encryption uses one key. True or False?
4. E-commerce transaction security is concerned with all of the following issues except:
a. Use of a firewall
b. Confidentiality
c. Authentication
d. Non repudiation of origin
5. All of the following are a part of a comprehensive security system except:
a. Raise employees' awareness of security problems.
b. Install software patches and updates on operating systems on a regular basis
c. Limit computer access to authorized personnel only
d. Do not post the security policy in a visible place
6. All of the following are among the techniques used by social engineers except:
a. Dumpster diving
b. Tailgating
c. Continuity planning
d. Pre-texting
Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: