Filters
Question type

Study Flashcards

________ is malware that hijacks a user's computer and demands payment in return for giving back access.


A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin

Correct Answer

verifed

verified

You can test software before it is even written by conducting a walkthrough.

Correct Answer

verifed

verified

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?


A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker

Correct Answer

verifed

verified

Which of the following statements about wireless security is not true?


A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Correct Answer

verifed

verified

The intentional defacement or destruction of a website is called:


A) spoofing.
B) cybervandalism.
C) cyberwarfare.
D) phishing.
E) pharming.

Correct Answer

verifed

verified

Smartphones typically feature state-of-the-art encryption and security features,making them highly secure tools for businesses.

Correct Answer

verifed

verified

Smartphones have the same security flaws as other Internet-connected devices.

Correct Answer

verifed

verified

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

Correct Answer

verifed

verified

Which of the following is not an example of a computer used as an instrument of crime?


A) Theft of trade secrets
B) Intentionally attempting to intercept electronic communication
C) Unauthorized copying of software
D) Breaching the confidentiality of protected computerized data
E) Schemes to defraud

Correct Answer

verifed

verified

________ use scanning software to look for known problems such as bad passwords,the removal of important files,security attacks in progress,and system administration errors.


A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls

Correct Answer

verifed

verified

Packet filtering catches most types of network attacks.

Correct Answer

verifed

verified

A foreign country attempting to access government networks in order to disable a national power grid is an example of:


A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.

Correct Answer

verifed

verified

________ identify the access points in a Wi-Fi network.


A) NICs
B) Mac addresses
C) URLs
D) UTMs
E) SSIDs

Correct Answer

verifed

verified

Which of the following is not an example of a computer used as a target of crime?


A) Knowingly accessing a protected computer to commit fraud
B) Accessing a computer system without authority
C) Illegally accessing stored electronic communication
D) Threatening to cause damage to a protected computer
E) Breaching the confidentiality of protected computerized data

Correct Answer

verifed

verified

Currently,the protocols used for secure information transfer over the Internet are:


A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) S-HTTP and SHTML.
E) SSL,TLS,and S-HTTP.

Correct Answer

verifed

verified

Define computer forensics and describe the types of problems it is designed to address.

Correct Answer

verifed

verified

Computer forensics involves the scientif...

View Answer

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

Correct Answer

verifed

verified

________ is malware that logs and transmits everything a user types.


A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer

Correct Answer

verifed

verified

Which of the following refers to policies,procedures,and technical measures used to prevent unauthorized access,alteration,theft,or physical damage to information systems?


A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management

Correct Answer

verifed

verified

Which of the following is a type of ambient data?


A) Computer log containing recent system errors
B) A file deleted from a hard disk
C) A file that contains an application's user settings
D) A set of raw data from an environmental sensor
E) Data that has been recorded over

Correct Answer

verifed

verified

Showing 81 - 100 of 100

Related Exams

Show Answer