Filters
Question type

Study Flashcards

What is Simplelocker?


A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Backdoor programs change their form as they propagate.

A) True
B) False

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of these

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?


A) Backdoor programs
B) Drive-by Hacking
C) Polymorphic viruses and worms
D) Hacker

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Describe the relationships and differences between hackers and viruses.

Correct Answer

verifed

verified

Hackers are experts in technology who us...

View Answer

Script-kiddies have criminal intent when hacking.

A) True
B) False

Correct Answer

verifed

verified

What is a form of malicious software that infects your computer and asks for money?


A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

A) True
B) False

Correct Answer

verifed

verified

Explain the ethical issues in the use of information technology.

Correct Answer

verifed

verified

Information ethics govern the ethical an...

View Answer

Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.

A) True
B) False

Correct Answer

verifed

verified

What is the method or system of government for information management or control?


A) Information management
B) Information compliance
C) Information governance
D) Information secrecy

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Which of the below represents the definition of information compliance?


A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company-owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Trust between companies, customers, partners, and suppliers is the support structure of which of the following?


A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

What is software that is intended to damage or disable computers and computer systems?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

A) True
B) False

Correct Answer

verifed

verified

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?


A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Showing 81 - 100 of 132

Related Exams

Show Answer