A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
Correct Answer
verified
Multiple Choice
A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) A law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Correct Answer
verified
Multiple Choice
A) A worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer.
B) A virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites.
C) A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer.
D) All of these
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Employees copying and distributing company owned software.
B) Employees searching other employee's private information without consent.
C) Employees intentionally creating or spreading viruses to confuse IT.
D) All of these.
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware
Correct Answer
verified
Multiple Choice
A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer
Correct Answer
verified
Multiple Choice
A) Power outages
B) Tornados
C) A system upgrade
D) Network failure
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 41 - 60 of 121
Related Exams