Filters
Question type

Study Flashcards

Secure sites typically use digital certificates along with security protocols.

A) True
B) False

Correct Answer

verifed

verified

Any illegal act involving a computer generally is referred to as a computer crime.

A) True
B) False

Correct Answer

verifed

verified

  -Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer? A) worm B) spike C) cookie D) payload -Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?


A) worm
B) spike
C) cookie
D) payload

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.

Correct Answer

verifed

verified

The term, zombie, is _____________.


A) a program that performs a repetitive task on a network
B) spam sent via email to spread viruses or commit a distributed denial of service attack
C) a group of compromised computers connected to a network that attacks other networks
D) a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

What is an AUP intended to do?


A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following does your financial institution use to reduce fraud?


A) digital forensics system
B) iris recognition system
C) signature verification system
D) hand geometry system

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -An assault whose purpose is to disrupt computer access to an Internet service

Correct Answer

verifed

verified

What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?


A) malware
B) cybersoft
C) evilapp
D) viralware

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

  -Which of the following categories are the rights to which creators are entitled for their work? A) community property B) intellectual property C) creative D) ethical -Which of the following categories are the rights to which creators are entitled for their work?


A) community property
B) intellectual property
C) creative
D) ethical

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following statements is not true about software theft?


A) A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
B) Software piracy is the unauthorized and illegal duplication of copyrighted software.
C) With a single-user license agreement, users are permitted to make one copy of the software as a backup.
D) Software theft includes disabling or removing programs from company computers.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?


A) CAN-SPAM Act
B) Computer Abuse Amendments Act
C) COPPA
D) Electronic Communication Privacy Act

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?


A) Electronic Communications Privacy Act (ECPA)
B) Fair Credit Reporting Act
C) Computer Fraud and Abuse Act
D) Computer Matching and Privacy Protection Act

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. ​ Which of the following is NOT permissible under a single-user license agreement? One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. ​ Which of the following is NOT permissible under a single-user license agreement?

Correct Answer

verifed

verified

​ ____ apps can allow you to lock your mobile device and SIM card remotely.


A) mobile security
B) remote security
C) mobile tech
D) SIM security

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?


A) network
B) distributed
C) site
D) multipurpose

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following terms refers to making a copy of a file?


A) restoring
B) backing up
C) encrypting
D) deciphering

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

Correct Answer

verifed

verified

disaster r...

View Answer

Showing 21 - 40 of 200

Related Exams

Show Answer