A) Packet tampering,worms,cakes,and Trojan viruses
B) Polymorphic,sniffer,splogs,and denial-of-service viruses
C) Backdoor program,worm,Trojan-horse viruses
D) All of these choices
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money
B) A ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Internet use
B) social media
C) information use
D) employee monitoring
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Compliance
B) Noncommittal
C) Nonrepudiation
D) Erepudiation
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Black-hat,cracker,cyberterrorist,hactivist,script kiddies,and white-hat hackers
B) Black-top,cookie,script kids,environment,Web 3.0,and white-top hackers
C) Black-hat,script kiddies,script bats,spider crawlers,Ad spiders,and white-hat hackers
D) None of these choices
Correct Answer
verified
Multiple Choice
A) It is considered illegal.
B) It is viewed as an invasion of privacy.
C) It can be costly and intrusive.
D) It requires constant monitoring and upgrading.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sniffer
B) Spyware
C) Spoofware
D) Splog
Correct Answer
verified
Multiple Choice
A) informed; collaborate
B) consent; informed
C) informed; consent
D) consent; information
Correct Answer
verified
Multiple Choice
A) Something the user knows such as a user ID and password
B) Something the user has such as a smart card or token
C) Something that is part of the user such as a fingerprint or voice signature
D) A combination of all of these choices
Correct Answer
verified
Multiple Choice
A) A broad term encompassing the protection of information
B) Protects information from accidental misuse
C) Protects information from intentional misuse
D) All of these choices
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Showing 141 - 160 of 333
Related Exams