Correct Answer
verified
View Answer
Multiple Choice
A) keep your password a secret
B) change your password frequently
C) keep a master password that is the same for all of your accounts
D) use letters, numbers, and symbols in your passwords
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) techniques used to manipulate people into performing actions or divulging confidential information
B) an unethical hacker
C) flaunts expertise to the administrator of a system
D) an ethical hacker
E) using an employer's computer for non-work activities
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) antivirus software
B) a password method
C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
D) a rootkit virus
Correct Answer
verified
Multiple Choice
A) Adware
B) Ghostware
C) Shareware
D) Spyware
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) bloatware
B) grayware
C) alertware
D) firmware
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
Correct Answer
verified
Multiple Choice
A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) phishing
B) pharming
C) pretexting
D) polymorphing
Correct Answer
verified
Showing 41 - 60 of 75
Related Exams