Filters
Question type

Study Flashcards

What is a program,when installed on a computer,records every keystroke and mouse click?


A) Key logger software
B) Spyware
C) Cookie
D) Adware

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is the Child Online Protection Act?


A) The unauthorized use,duplication,distribution,or sale of copyrighted software.
B) Refers to the ability of a company to identify,search,gather,seize,or export digital information in responding to a litigation,audit,investigation,or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage,limit,or prevent illegal copying and distribution.

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Information _______________ examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.

Correct Answer

verifed

verified

A patent is the legal protection afforded an expression of an idea,such as a song,book,or video game.

A) True
B) False

Correct Answer

verifed

verified

_____________ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Correct Answer

verifed

verified

Typosquatt...

View Answer

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

A) True
B) False

Correct Answer

verifed

verified

An information security ___________ details how an organization will implement the information security policies.

Correct Answer

verifed

verified

Frozen pipe,bomb threat,epidemic,fire,or terrorism are all examples of unplanned __________.

Correct Answer

verifed

verified

Downtime o...

View Answer

A Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

A) True
B) False

Correct Answer

verifed

verified

What passed to protect minors from accessing inappropriate material on the Internet?


A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Information management examines the organizational resource of information and regulates its definitions,uses,value,and distribution ensuring it has the types of data/information required to function and grow effectively.

A) True
B) False

Correct Answer

verifed

verified

_______________ includes threats,negative remarks,or defamatory comments transmitted via the Internet or posted on the website.

Correct Answer

verifed

verified

Which of the following definitions represents Internet censorship?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

An ethical computer use policy contains general principles to guide computer user behavior.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents Website name stealing?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) The theft of a website's name that occurs when someone,posing as a site's administrator,changes the ownership of the domain name assigned to the website to another website owner.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
D) An antispamming approach where the receiving computer launches a return attack against the spammer,sending email messages back to the computer that originated the suspected spam.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

What is drive-by hacking?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks,either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network,intercepts data,uses network services,and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that,while purporting to serve some useful function and often fulfilling that function,also allows Internet advertisers to display advertisements without the consent of the computer user.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Organizations address security risks through two lines of defense;the first is __________,and the second is technology.

Correct Answer

verifed

verified

Cybervandalism is the electronic defacing of an existing website.

A) True
B) False

Correct Answer

verifed

verified

Which of the following definitions represents physical security?


A) A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
B) Tangible protection such as alarms,guards,fireproof doors,fences,and vaults.
C) Government attempts to control Internet traffic,thus preventing some material from being viewed by a country's citizens.
D) Choosing to deny permission to incoming emails.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information.What type of identity theft were you just a victim of?


A) Pharming
B) Worm holes
C) Phishing
D) Insider hacking

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 161 - 180 of 342

Related Exams

Show Answer