Filters
Question type

Study Flashcards

A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.

A) True
B) False

Correct Answer

verifed

verified

A _______ is someone who gains unauthorized access to computer systems.

Correct Answer

verifed

verified

Describe how information about individuals is collected and compiled.

Correct Answer

verifed

verified

Large organizations are constantly compi...

View Answer

Computer criminals that create and spread viruses are punished under this law.


A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.

Correct Answer

verifed

verified

_______ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

Correct Answer

verifed

verified

Cyberbully...

View Answer

Free computer games and free screen saver programs are typical carriers of _______.


A) DoS
B) worms
C) viruses
D) Trojan horses

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

_______ scanning devices use fingerprints and iris scanners to identify individuals.

Correct Answer

verifed

verified

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.


A) Restriction
B) Security
C) Protection
D) Encryption

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.

A) True
B) False

Correct Answer

verifed

verified

_______ (2 words) are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

Correct Answer

verifed

verified

Trojan hor...

View Answer

A _______ acts as a security buffer between a corporation's private network and all external networks.


A) firewall
B) password
C) disaster recovery plan
D) virus checker

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Programs used to secretly record an individual's activities on the Internet are called _______.


A) spyware
B) cookies
C) sniffer programs
D) keystroke loggers

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Biometric scanning devices are used to scan employee identification cards.

A) True
B) False

Correct Answer

verifed

verified

If copyright-protected music is uploaded to a website, it is legal to download it.

A) True
B) False

Correct Answer

verifed

verified

Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a measure to protect computer security?


A) Restricting access
B) Encrypting data
C) Copying data and storing it at a remote location
D) Keeping the same password on all systems consistently

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 78 of 78

Related Exams

Show Answer