Filters
Question type

Study Flashcards

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

What was passed to protect minors from accessing inappropriate material on the Internet?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?


A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.

A) True
B) False

Correct Answer

verifed

verified

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?


A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What is a hacker?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?


A) Information code
B) Information technology
C) Information management
D) Information governance

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is pirated software?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) A law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following represents the two fundamental building blocks that protect organizational information?


A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software.
B) Employees search organizational databases for sensitive corporate and personal information.
C) Individuals hack into computer systems to steal proprietary information.
D) None of these offers an example of acting ethically

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Information governance is a method or system of government for information management or control.

A) True
B) False

Correct Answer

verifed

verified

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Sniffer
B) Spyware
C) Spoofware
D) Splog

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following are all common forms of viruses?


A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of these

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

A) True
B) False

Correct Answer

verifed

verified

Who are hackers with criminal intent?


A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?


A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a cost of downtime in addition to lost revenue?


A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?


A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 121

Related Exams

Show Answer