A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Drive-by Hacking
C) Polymorphic viruses and worms
D) Hacker
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) Employees copying and distributing company-owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these
Correct Answer
verified
Multiple Choice
A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies
Correct Answer
verified
Showing 81 - 100 of 132
Related Exams