Filters
Question type

Study Flashcards

Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.

A) True
B) False

Correct Answer

verifed

verified

What is software written with malicious intent to cause annoyance or damage?


A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is intangible creative work that is embodied in physical form and includes trademarks and patents?


A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Pirated software is software that is manufactured to look like the real thing and sold as such.

A) True
B) False

Correct Answer

verifed

verified

Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.

A) True
B) False

Correct Answer

verifed

verified

Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.

A) True
B) False

Correct Answer

verifed

verified

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is adware?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

A) True
B) False

Correct Answer

verifed

verified

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___________.


A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Backdoor programs open a way into the network for future attacks.

A) True
B) False

Correct Answer

verifed

verified

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

A) True
B) False

Correct Answer

verifed

verified

A worm is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

A company should be able to calculate the cost of downtime by which of the following?


A) Per hour, per day, and per week
B) Per employee, per computer, and per company
C) Per stock, per stockholder, and per investment capital
D) None of these

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

A) True
B) False

Correct Answer

verifed

verified

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?


A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of these

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following represents the definition of information compliance?


A) The act of conforming, acquiescing, or yielding information.
B) The ability to comply with software.
C) The understanding of technology.
D) The verbalization of information governance in a company's policies and procedures.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Ethics and security are two fundamental building blocks for all organizations.

A) True
B) False

Correct Answer

verifed

verified

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

A) True
B) False

Correct Answer

verifed

verified

Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 100 of 121

Related Exams

Show Answer