A) A form of malicious software that infects your computer and asks for money
B) A ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
Multiple Choice
A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) Tangible protection such as alarms,guards,fireproof doors,fences,and vaults
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens
D) Choosing to deny permission to incoming emails
Correct Answer
verified
Multiple Choice
A) Between a personal computer and the server
B) Between a personal computer and a printer
C) Between the server and the content filtering software
D) Between the server and the Internet
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Cybervandalism
C) Click-fraud
D) Competitive click-fraud
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyberbulling
B) Fair information practices
C) Click-fraud
D) Bring your own device
Correct Answer
verified
Multiple Choice
A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker
Correct Answer
verified
Multiple Choice
A) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
B) A technique to gain personal information for the purpose of identity theft,usually by means of fraudulent emails that look as though they came from legitimate businesses
C) A masquerading attack that combines spam with spoofing
D) A phishing expedition in which the emails are carefully designed to target a particular person or organization
Correct Answer
verified
Multiple Choice
A) Defines legitimate email users and explains what happens to accounts after a person leaves the organization
B) Discourages sending junk email or spam to anyone who doesn't want to receive it
C) Informs users that the organization has no control over email once it has been transmitted outside the organization
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Unlimited access for personal devices
B) Access only to nonsensitive systems and data
C) Access,but preventing local storage of data on personal devices
D) All of these choices
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Showing 1 - 20 of 333
Related Exams