A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs
Correct Answer
verified
Multiple Choice
A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant
Correct Answer
verified
Multiple Choice
A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) A broad term encompassing the protection of information.
B) Protection of information from accidental misuse.
C) Protection of information from intentional misuse.
D) All of these
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of these
Correct Answer
verified
Multiple Choice
A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Virus
C) Hacker
D) Worm
Correct Answer
verified
Multiple Choice
A) Information spy
B) Hacker
C) Spyware
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The assurance that messages and data are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
Showing 61 - 80 of 121
Related Exams