A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
C) Government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
D) Choosing to deny permission to incoming emails.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of the above
Correct Answer
verified
Multiple Choice
A) Information security
B) Physical security
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information secrecy
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) Information privacy policy
B) Acceptable use policy
C) Internet use policy
D) Ethical computer use policy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) Spyware
B) Web log
C) Adware
D) Hardware key logger
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Firewall
B) Digital certificate
C) Virus software
D) Antivirus software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital certificate
Correct Answer
verified
Showing 61 - 80 of 354
Related Exams