Filters
Question type

Study Flashcards

Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.

A) True
B) False

Correct Answer

verifed

verified

What is a form of malicious software that infects your computer and asks for money?


A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?


A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?


A) Ethical information
B) Information technology
C) Information policies
D) Information ethics

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What includes a variety of threats such as viruses, worms, and Trojan horses?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Describe the relationship between ethics and privacy.

Correct Answer

verifed

verified

Ethics are the principles and standards ...

View Answer

Which of the following is an example of acting ethically?


A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information
C) Individuals hack into computer systems to steal proprietary information
D) None of these offers an example of acting ethically

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

A) True
B) False

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Sniffer
B) Spyware
C) Spoofware
D) Splog

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A worm is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

A) True
B) False

Correct Answer

verifed

verified

Showing 121 - 132 of 132

Related Exams

Show Answer