Filters
Question type

Study Flashcards

COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?


A) cyberware
B) conware
C) criminalware
D) crimeware

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?


A) substitution
B) transposition
C) expansion
D) compaction

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?


A) digital forensics system
B) voice verification system
C) iris recognition system
D) hand geometry system

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
A notice that guarantees a user or a website is legitimate.
A common infringement of copyright.
A scam in which a button or link on a website contains a malicious program.
Most systems require that a user selects this on his or her own.
Protects any tangible form of expression.
In the encryption process, the unencrypted, readable data.
A program that performs a repetitive task on a network.
A program that restricts access to specified websites.
Protects a network's resources from intrusion.
Usually does not have advanced computer and technical skills.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
In the encryption process, the encrypted (scrambled) data.
An assault whose purpose is to disrupt computer access to an Internet service
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
A group of compromised computers.
Outlines the activities for which a computer or network may and may not be used.
Biometric device used in high security areas.
An authorized person or company that issues and verifies digital certificates.
Makes it illegal to circumvent antipiracy schemes in commercial software.
Responses
botnet
digital security risk
digital signature
DoS attack
Digital Millennium Copyright Act (DCMA)
digital certificate
piracy
ciphertext
plaintext
iris recognition system
password
CA
web filtering software
script kiddie
copyright
clickjacking
AUP
firewall
zombie
bot

Correct Answer

A notice that guarantees a user or a website is legitimate.
A common infringement of copyright.
A scam in which a button or link on a website contains a malicious program.
Most systems require that a user selects this on his or her own.
Protects any tangible form of expression.
In the encryption process, the unencrypted, readable data.
A program that performs a repetitive task on a network.
A program that restricts access to specified websites.
Protects a network's resources from intrusion.
Usually does not have advanced computer and technical skills.
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
In the encryption process, the encrypted (scrambled) data.
An assault whose purpose is to disrupt computer access to an Internet service
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Any event or action that could cause a loss of or damage to computer or mobile device hardware.
A group of compromised computers.
Outlines the activities for which a computer or network may and may not be used.
Biometric device used in high security areas.
An authorized person or company that issues and verifies digital certificates.
Makes it illegal to circumvent antipiracy schemes in commercial software.

COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?


A) content filtering
B) information monitoring
C) data mining
D) social profiling

Correct Answer

verifed

verified

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?


A) They reset the files.
B) The index the files.
C) They restore the files.
D) They resource the files.

Correct Answer

verifed

verified

Proximity sharing gives websites access to your current location.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following does your college use to verify your identity?


A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system

Correct Answer

verifed

verified

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

Correct Answer

verifed

verified

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?


A) rebuking
B) spoofing
C) transmitting
D) victimizing

Correct Answer

verifed

verified

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

Correct Answer

verifed

verified

The most common type of license included with software purchased by individual users is a(n) ____________________.

Correct Answer

verifed

verified

end-user l...

View Answer

COGNITIVE ASSESSMENT You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?


A) CAPTCHA
B) CERT/CC
C) two-step verification
D) serial authentication

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?


A) The term fair use refers to the rights which creators are entitled for their work.
B) Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
C) A copyright protects any tangible form of expression.
D) Digital rights management is a strategy designed to prevent illegal distribution of digital content.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a web server stores on your computer?


A) a breadcrumb
B) a nugget
C) a cracker
D) a cookie

Correct Answer

verifed

verified

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?


A) script kiddie
B) cracker
C) cyberextortionist
D) cyberterrorist

Correct Answer

verifed

verified

Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

Correct Answer

verifed

verified

Your browsing history is a list of all websites you have visited over a period of time.

Correct Answer

verifed

verified

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?


A) data rights
B) acceptable use
C) social restrictions
D) information privacy

Correct Answer

verifed

verified

Showing 81 - 100 of 181

Related Exams

Show Answer