Correct Answer
verified
Multiple Choice
A) Counterfeit is fake technology products, where pirated is invisible technological cameras placed online
B) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such
C) Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software, where pirated is software that is manufactured to look like the real thing and sold as such
D) Pirated is stolen software used to hack into a company's classified material, where counterfeit is a fake version of firewall software
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) A form of social engineering in which one individual lies to obtain confidential data about another individual.
B) A hacker looks through your trash to find personal information.
C) Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
D) Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Correct Answer
verified
Multiple Choice
A) Reroutes requests for legitimate websites to false websites.
B) A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
C) A masquerading attack that combines spam with spoofing.
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization.
Correct Answer
verified
Multiple Choice
A) Acceptable use policy
B) Email privacy policy
C) Internet use policy
D) All of the above
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Key logger software
B) Spyware
C) Cookie
D) Adware
Correct Answer
verified
Multiple Choice
A) The individual user
B) The company
C) The human resources department
D) The individual user's department
Correct Answer
verified
Multiple Choice
A) An internet workplace policy
B) A social media policy
C) A technology information policy
D) A YouTube policy
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 321 - 340 of 354
Related Exams