Filters
Question type

A medical office sending lab results to the wrong person is an example of ____.


A) mishandling of computer output
B) errors in computer programs
C) data-entry errors
D) improper installation and setup of computer systems

Correct Answer

verifed

verified

Bluetooth is the technology behind ____ area networks that allows personal digital devices, like cell phones and headsets, to communicate wirelessly at short distances.


A) personal
B) business
C) local
D) regional

Correct Answer

verifed

verified

The backup software option of backing up just those files that have changed since the last backup is called a(n) ____ backup.


A) stopgap
B) incremental
C) half
D) replacement

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -The act of subverting computer security without authorization


A) business intelligence b. password
C) username
D) group ownership
E) file ownership
F) counterintelligence
G) world ownership
H) competitive intelligence
I) user permissions
J) system penetration
K) cracker
L) hacker

Correct Answer

verifed

verified

People who drive through neighborhoods, looking for unsecured networks, use software such as ____ that probes and scans for networks.


A) NetTime
B) NetSearch
C) NetStumbler
D) NetHelper

Correct Answer

verifed

verified

____________________ is the science and technology of authentication by scanning and measuring a person's unique physical features such as fingerprints, retinal patterns, and facial characteristics.

Correct Answer

verifed

verified

____________________ involves taking credit for someone else's intellectual property, typically a written idea, by claiming it as your own.

Correct Answer

verifed

verified

The concept of information security is built on the assumption that the information you create, store, maintain, and transfer is ____.


A) valuable
B) confidential
C) worth protecting
D) all of the above

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -Business intelligence concerned with protecting your information from access by your competitors


A) business intelligence b. password
C) username
D) group ownership
E) file ownership
F) counterintelligence
G) world ownership
H) competitive intelligence
I) user permissions
J) system penetration
K) cracker
L) hacker

Correct Answer

verifed

verified

Los Angeles International Airport reported that on average, ____ laptops per week are lost on its premises.


A) 300
B) 600
C) 1,200
D) 2,000

Correct Answer

verifed

verified

Many attackers use the Microsoft monthly announcements to reverse-engineer hacking tools that take advantage of the newly found bugs.

Correct Answer

verifed

verified

In 2009, President Obama created a new senior-level position in the White House to oversee cybersecurity across all areas of government and national infrastructure.

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. -Business intelligence concerned with information about competitors


A) business intelligence b. password
C) username
D) group ownership
E) file ownership
F) counterintelligence
G) world ownership
H) competitive intelligence
I) user permissions
J) system penetration
K) cracker
L) hacker

Correct Answer

verifed

verified

Diana Andrews is in charge of keeping e-mail safe for the 400 employees of a mail order company. To increase employee awareness of security threats, Diana sends out a weekly e-zine with helpful updates. -Diana also explains that in the criminal act of ____, hackers hijack a domain name service (DNS) server to automatically redirect users from legitimate Web sites to spoofed Web sites in the effort to steal personal information.


A) phishing
B) pharming
C) spamming
D) spying

Correct Answer

verifed

verified

Social ____________________ exploits the natural human tendency to trust others.

Correct Answer

verifed

verified

A ____ is someone who takes advantage of security vulnerabilities to gain unlawful access to private networks for the purpose of private advantage.


A) black-hat hacker
B) white-hat hacker
C) gray-hat hacker
D) script kiddie

Correct Answer

verifed

verified

Please name three actions that smart businesses and organizations do to prevent computer-related mistakes.

Correct Answer

verifed

verified

- Smart businesses and organizations aut...

View Answer

Most Wi-Fi networks are centered around a device called a(n) portal point. _________________________

Correct Answer

verifed

verified

____________________ property refers to a product of the mind or intellect over which the owner holds legal entitlement.

Correct Answer

verifed

verified

A(n) ____________________ system is a computer system, such as a computer network, where multiple users share access to resources such as file systems.

Correct Answer

verifed

verified

Showing 21 - 40 of 150

Related Exams

Show Answer