Correct Answer
verified
View Answer
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) Information code
B) Information technology
C) Information management
D) Information governance
Correct Answer
verified
Multiple Choice
A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) A law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Correct Answer
verified
Multiple Choice
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
Correct Answer
verified
Multiple Choice
A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these offers an example of acting ethically
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Splog
Correct Answer
verified
Multiple Choice
A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists
Correct Answer
verified
Multiple Choice
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Showing 21 - 40 of 121
Related Exams