Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) worm
B) spike
C) cookie
D) payload
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
Multiple Choice
A) a program that performs a repetitive task on a network
B) spam sent via email to spread viruses or commit a distributed denial of service attack
C) a group of compromised computers connected to a network that attacks other networks
D) a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup
Correct Answer
verified
Multiple Choice
A) digital forensics system
B) iris recognition system
C) signature verification system
D) hand geometry system
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) malware
B) cybersoft
C) evilapp
D) viralware
Correct Answer
verified
Multiple Choice
A) community property
B) intellectual property
C) creative
D) ethical
Correct Answer
verified
Multiple Choice
A) A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
B) Software piracy is the unauthorized and illegal duplication of copyrighted software.
C) With a single-user license agreement, users are permitted to make one copy of the software as a backup.
D) Software theft includes disabling or removing programs from company computers.
Correct Answer
verified
Multiple Choice
A) CAN-SPAM Act
B) Computer Abuse Amendments Act
C) COPPA
D) Electronic Communication Privacy Act
Correct Answer
verified
Multiple Choice
A) Electronic Communications Privacy Act (ECPA)
B) Fair Credit Reporting Act
C) Computer Fraud and Abuse Act
D) Computer Matching and Privacy Protection Act
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) mobile security
B) remote security
C) mobile tech
D) SIM security
Correct Answer
verified
Multiple Choice
A) network
B) distributed
C) site
D) multipurpose
Correct Answer
verified
Multiple Choice
A) restoring
B) backing up
C) encrypting
D) deciphering
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Showing 21 - 40 of 200
Related Exams