Filters
Question type

Study Flashcards

Which of the following are all common forms of viruses?


A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of these

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What is a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the below represents the definition of information secrecy?


A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?


A) Sniffer
B) Spyware
C) Spoofware
D) Simplelocker

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

A) True
B) False

Correct Answer

verifed

verified

What is ransomware?


A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of these

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.

A) True
B) False

Correct Answer

verifed

verified

Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A) True
B) False

Correct Answer

verifed

verified

What was passed to protect minors from accessing inappropriate material on the Internet?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

A) True
B) False

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

A) True
B) False

Correct Answer

verifed

verified

Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

Ransomware is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes trademarks and patents?


A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 101 - 120 of 132

Related Exams

Show Answer