Correct Answer
verified
Multiple Choice
A) What is the productivity cost associated with each hour of downtime?
B) How many transactions can the company afford to lose without significantly harming business?
C) All of the above
D) None of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of the above
Correct Answer
verified
Multiple Choice
A) Bork Bill
B) Sarbanes-Oxley Act
C) Cable Communications Act
D) None of the above
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Virus
C) Hacker
D) Worm
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies
Correct Answer
verified
Multiple Choice
A) The unauthorized use,duplication,distribution,or sale of copyrighted software
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.
Correct Answer
verified
Multiple Choice
A) Social engineering
B) Social media
C) Social viruses
D) Social processes
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Phishing
B) Authentication
C) Authorization
D) Programming
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 1 - 20 of 344
Related Exams