Filters
Question type

Study Flashcards

Which of the following changes its form as it propagates?


A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Correct Answer

verifed

verified

When studying the figure of the four quadrants of ethical and legal behavior,the goal is for organizations to make decisions in which of the following quadrants?


A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is the electronic defacing of an existing website?


A) Cyberbulling
B) Cybervandalism
C) Cookie
D) All of this

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A(n)_________ is software written with malicious intent to cause annoyance or damage.

Correct Answer

verifed

verified

Dumpster diving is another security breach for companies and is where people not associated with the company jump into the company's outside garbage bins and try to gather and steal any valuable company products they can resell on eBay.

A) True
B) False

Correct Answer

verifed

verified

Website name stealing is the theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.

A) True
B) False

Correct Answer

verifed

verified

_________ seeks to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

Correct Answer

verifed

verified

Cyberterrorist or Cy...

View Answer

Which of the following is considered a type of biometrics?


A) Voice
B) Face
C) Iris
D) All of the above

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

Correct Answer

verifed

verified

Which of the following key terms represents the principles and standards that guide our behavior toward other people?


A) Ethics
B) Intellectual property
C) Standards of living
D) Security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

___________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

Correct Answer

verifed

verified

A digital _____________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.

Correct Answer

verifed

verified

Copyright is an exclusive right to make,use,and sell an invention and is granted by a government to the inventor.

A) True
B) False

Correct Answer

verifed

verified

In relation to privacy,which of the following is the assurance that messages and information remain available only to those authorized to view them?


A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the below represents the biggest problem of information security breaches?


A) People misusing organizational information
B) Technology failures
C) Customers misusing organizational systems
D) Company departments missing sales goals

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights,trademarks,and patents.

A) True
B) False

Correct Answer

verifed

verified

What is the difference between pirated and counterfeit software?


A) Counterfeit is fake technology products,where pirated is invisible technological cameras placed online
B) Pirated is the unauthorized use,duplication,distribution,or sale of copyrighted software,where counterfeit is software that is manufactured to look like the real thing and sold as such
C) Counterfeit is the unauthorized use,duplication,distribution,or sale of copyrighted software,where pirated is software that is manufactured to look like the real thing and sold as such
D) Pirated is stolen software used to hack into a company's classified material,where counterfeit is a fake version of firewall software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What includes a variety of threats such as viruses,worms,and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

Showing 181 - 200 of 342

Related Exams

Show Answer