Filters
Question type

Study Flashcards

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The most common type of license included with software purchased by individual users is a(n) ____________________.

Correct Answer

verifed

verified

end-user license agreement,EUL...

View Answer

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?


A) restored file
B) bot
C) IP file
D) backup

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Many businesses use spyware to limit employees' web access.

A) True
B) False

Correct Answer

verifed

verified

The term, botnet, means _____________.


A) a program that performs a repetitive task on a network
B) spam sent via email to spread viruses or commit a distributed denial of service attack
C) a group of compromised computers connected to a network that attacks other networks
D) a computer whose owner is unaware that the computer is being controlled remotely by an outsider

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.

Correct Answer

verifed

verified

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements is not true about intellectual property rights?


A) The term fair use refers to the rights which creators are entitled for their work.
B) Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
C) A copyright protects any tangible form of expression.
D) Digital rights management is a strategy designed to prevent illegal distribution of digital content.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

A) True
B) False

Correct Answer

verifed

verified

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?


A) data rights
B) acceptable use
C) social restrictions
D) information privacy

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

A) True
B) False

Correct Answer

verifed

verified

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

Correct Answer

verifed

verified

   Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure. Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?


A) site
B) network
C) distributed
D) multipurpose

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is the term for a website that uses encryption techniques to protect its data?


A) virtual site
B) locked site
C) secure site
D) vault

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

Correct Answer

verifed

verified

Which of the following is a program or set of instructions in a program that allows users to bypass security controls?


A) keygens
B) indices
C) rootkit
D) back door

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?


A) script kiddie
B) cracker
C) cyberextortionist
D) cyberterrorist

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 181

Related Exams

Show Answer