Filters
Question type

Study Flashcards

A rootkit can be a back door.

A) True
B) False

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -A common infringement of copyright.


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) E) and G)
V) E) and N)

Correct Answer

verifed

verified

Analog signatures help to prevent email forgery.

A) True
B) False

Correct Answer

verifed

verified

Websites use which of the following to keep track of items in a user's shopping cart?


A) session cookie
B) zombie
C) adware
D) shopping bot

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

A) True
B) False

Correct Answer

verifed

verified

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.

A) True
B) False

Correct Answer

verifed

verified

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?


A) rebuking
B) spoofing
C) transmitting
D) victimizing

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Programmers often build trapdoors into programs during system development.

A) True
B) False

Correct Answer

verifed

verified

Into which of the following kinds of ports do external fingerprint readers plug?


A) parallel
B) MIDI
C) USB
D) serial

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?


A) distributed
B) delayed
C) limited
D) staggered

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -A program that restricts access to specified websites.


A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright

U) N) and S)
V) A) and S)

Correct Answer

verifed

verified

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?


A) re-securing
B) decryption
C) assessment
D) digitization

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is the process of restricting access to certain material on the web?


A) text remastering
B) content filtering
C) indexing
D) material masking

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Case 5-2 ​ In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. -Which of the following is not a frequently discussed area of technology ethics?


A) green computing
B) information accuracy
C) information authorship
D) codes of conduct

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following statements is not a safeguard against the failure of hardware?


A) surge protectors
B) fault-tolerant computers
C) device-tracking apps
D) UPS

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

  -Which of the following is not a possessed object? A) PIN B) badge C) smart card D) key -Which of the following is not a possessed object?


A) PIN
B) badge
C) smart card
D) key

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Showing 181 - 197 of 197

Related Exams

Show Answer