A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Correct Answer
verified
Multiple Choice
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Iris scan
B) Password
C) Fingerprint
D) Handwriting
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Authentication and authorization, prevention and resistance, prevention and response
B) Authentication and authorization, prevention and response, detection and response
C) Analyzing and authenticating, prevention and repositioning, detection and response
D) Authentication and authorization, prevention and resistance, detection and response
Correct Answer
verified
Multiple Choice
A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Key logger
B) Hardware key logger
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) Phone number
B) Social Security number
C) Address
D) Driver's license number
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Correct Answer
verified
Multiple Choice
A) Opt out
B) Website name stealing
C) Internet censorship
D) Teergrubing
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Private key encryption
B) Policy key encryption
C) Public key encryption
D) Protective key code
Correct Answer
verified
Multiple Choice
A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of the above
Correct Answer
verified
True/False
Correct Answer
verified
Showing 241 - 260 of 354
Related Exams