Correct Answer
verified
Matching
Correct Answer
Multiple Choice
A) 25
B) 35
C) 55
D) 75
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup
Correct Answer
verified
Multiple Choice
A) network
B) distributed
C) site
D) multipurpose
Correct Answer
verified
Multiple Choice
A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) distributed
B) delayed
C) limited
D) staggered
Correct Answer
verified
Multiple Choice
A) manager filtering
B) employee monitoring
C) job spamming
D) employee indexing
Correct Answer
verified
Multiple Choice
A) restored file
B) bot
C) IP file
D) backup
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) creating consumer and personal profiles by tracking website history and electronic purchases
B) compiling data from multiple computer users in order to make predictions about computer trends
C) filtering Internet content to targeted users based on their personal preferences
D) gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Correct Answer
verified
Multiple Choice
A) a virus
B) a worm
C) a Trojan horse
D) a rootkit
Correct Answer
verified
Multiple Choice
A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist
Correct Answer
verified
Matching
Correct Answer
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Showing 141 - 160 of 200
Related Exams