Filters
Question type

Study Flashcards

During virtual browsing, your browser does not keep track of the websites you are visiting.

A) True
B) False

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
Responses
clickjacking
digital signature
firewall
botnet
web filtering software
iris recognition system
digital certificate
AUP
CA
digital security risk
Digital Millennium Copyright Act (DCMA)
zombie
DoS attack
script kiddie
piracy
password
copyright
ciphertext
bot
plaintext

Correct Answer

clickjacking
digital signature
firewall
botnet
web filtering software
iris recognition system
digital certificate
AUP
CA
digital security risk
Digital Millennium Copyright Act (DCMA)
zombie
DoS attack
script kiddie
piracy
password
copyright
ciphertext
bot
plaintext

  One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage? A)  25 B)  35 C)  55 D)  75 One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?


A) 25
B) 35
C) 55
D) 75

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

A) True
B) False

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What is an AUP intended to do?


A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?


A) network
B) distributed
C) site
D) multipurpose

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

E) None of the above
F) All of the above

Correct Answer

verifed

verified

To remove spyware, users need to obtain a special program that can detect and delete it.

A) True
B) False

Correct Answer

verifed

verified

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

A) True
B) False

Correct Answer

verifed

verified

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?


A) distributed
B) delayed
C) limited
D) staggered

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?


A) manager filtering
B) employee monitoring
C) job spamming
D) employee indexing

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?


A) restored file
B) bot
C) IP file
D) backup

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

A(n)____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.


A) creating consumer and personal profiles by tracking website history and electronic purchases
B) compiling data from multiple computer users in order to make predictions about computer trends
C) filtering Internet content to targeted users based on their personal preferences
D) gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?


A) a virus
B) a worm
C) a Trojan horse
D) a rootkit

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
A scam in which a button or link on a website contains a malicious program.
Responses
bot
plaintext
DoS attack
botnet
digital security risk
firewall
web filtering software
copyright
password
piracy
ciphertext
zombie
AUP
script kiddie
CA
Digital Millennium Copyright Act (DCMA)
iris recognition system
digital certificate
clickjacking
digital signature

Correct Answer

bot
plaintext
DoS attack
botnet
digital security risk
firewall
web filtering software
copyright
password
piracy
ciphertext
zombie
AUP
script kiddie
CA
Digital Millennium Copyright Act (DCMA)
iris recognition system
digital certificate
clickjacking
digital signature

If a program or device has a default password, be sure to retain it.

A) True
B) False

Correct Answer

verifed

verified

   Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program. Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

Correct Answer

verifed

verified

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

A) True
B) False

Correct Answer

verifed

verified

Showing 141 - 160 of 200

Related Exams

Show Answer