A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of these
Correct Answer
verified
Multiple Choice
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Simplelocker
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
Correct Answer
verified
Multiple Choice
A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property
Correct Answer
verified
Showing 101 - 120 of 132
Related Exams