Filters
Question type

Study Flashcards

The most common type of license included with software purchased by individual users is a(n) ____________________.

Correct Answer

verifed

verified

end-user license agreement
EUL...

View Answer

The term, PIN, is an acronym for which of the following?


A) personal identification number
B) private Internet notification
C) possessed information number
D) personal information network

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

Correct Answer

verifed

verified

  -The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies. -The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

A) True
B) False

Correct Answer

verifed

verified

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -A scam in which a button or link on a website contains a malicious program.


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) G) and T)
V) A) and J)

Correct Answer

verifed

verified

A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

Correct Answer

verifed

verified

disaster r...

View Answer

It is illegal for employers to use software programs that monitor employees.

A) True
B) False

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -Protects a network's resources from intrusion.


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) O) and R)
V) A) and T)

Correct Answer

verifed

verified

A(n) ____________________ agreement is the right to use software.

Correct Answer

verifed

verified

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?


A) manager filtering
B) employee monitoring
C) job spamming
D) employee indexing

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Which of the following can transmit germs?


A) iris recognition systems
B) digital forensics systems
C) face recognition systems
D) hand geometry systems

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following statements is not true about biometric devices?


A) Personal characteristics are unique and cannot be forgotten or misplaced.
B) Biometric devices are an unreliable method of identification and notification.
C) Examples include fingerprint readers and hand geometry systems.
D) Biometric devices translate a personal characteristic into a digital code.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?


A) CAPTCHA
B) CERT/CC
C) two-step verification
D) serial authentication

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If you are nervous, a signature might not match the one on file in a signature verification system.

A) True
B) False

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -An assault whose purpose is to disrupt computer access to an Internet service


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) E) and O)
V) G) and S)

Correct Answer

verifed

verified

Which term is used to describe software used by cybercriminals?


A) cyberware
B) conware
C) criminalware
D) crimeware

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which type of individual may steal credit card numbers to make fraudulent purchases?


A) corrupt
B) Caesar
C) administrator
D) kiddie

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following terms refers to making a copy of a file?


A) restoring
B) backing up
C) encrypting
D) deciphering

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 197

Related Exams

Show Answer