Filters
Question type

Study Flashcards

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?


A) manager filtering
B) employee monitoring
C) job spamming
D) employee indexing

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?


A) software deployment
B) software decryption
C) app installation
D) product activation

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?


A) digital security risk
B) information liability
C) technical terrorism
D) network compromise

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

____________________ is the unauthorized and illegal duplication of copyrighted software.

Correct Answer

verifed

verified

Software p...

View Answer

Which of the following statements is not true about intellectual property rights?


A) The term fair use refers to the rights which creators are entitled for their work.
B) Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
C) A copyright protects any tangible form of expression.
D) Digital rights management is a strategy designed to prevent illegal distribution of digital content.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

  -Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information? A) spam B) spit C) phishing D) spyware -Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?


A) spam
B) spit
C) phishing
D) spyware

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.


A) information theft
B) software theft
C) digital forensics
D) decryption

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following can be used to create a software registration number, sometimes illegally?


A) BSA
B) decryption key
C) keygen
D) public key

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?


A) spoofing
B) phishing
C) veiling
D) costuming

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -Most systems require that a user selects this on his or her own.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -Usually does not have advanced computer and technical skills.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -A common infringement of copyright.

Correct Answer

verifed

verified

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements is not true about biometric devices?


A) Personal characteristics are unique and cannot be forgotten or misplaced.
B) Biometric devices are an unreliable method of identification and notification.
C) Examples include fingerprint readers and hand geometry systems.
D) Biometric devices translate a personal characteristic into a digital code.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -In the encryption process, the encrypted (scrambled) data.

Correct Answer

verifed

verified

One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.

A) True
B) False

Correct Answer

verifed

verified

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following terms means in a location separate from the computer site?


A) off-scope
B) off-shore
C) off-line
D) off-site

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

  -One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage? A) 25 B) 35 C) 55 D) 75 -One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?


A) 25
B) 35
C) 55
D) 75

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 121 - 140 of 200

Related Exams

Show Answer