A) sending spam via email
B) spreading viruses
C) committing a distributed denial of service attack
D) authoring ActiveX scripts
Correct Answer
verified
Multiple Choice
A) XPN
B) SPN
C) TPN
D) VPN
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) restoring
B) backing up
C) encrypting
D) deciphering
Correct Answer
verified
Multiple Choice
A) a private combination of words associated with a user name that allows access to computer resources
B) the average time it takes a computer to discover a password based on the number of characters
C) a digital image used to help decipher a faded or blurry word in digitized news archives
D) a series of distorted characters that a user is required to enter correctly to continue using a website
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) political anger
B) spoofing
C) extortion
D) negative recognition
Correct Answer
verified
Multiple Choice
A) hand geometry system
B) face recognition system
C) iris recognition system
D) digital forensics system
Correct Answer
verified
Multiple Choice
A) a decipher module
B) a translation tool
C) an encryption algorithm
D) a decryption key
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) ENERGY STAR
B) SECURE ELECTRONICS
C) ACCEPTABLE USE
D) GREEN COMPUTING
Correct Answer
verified
Multiple Choice
A) BSA
B) decryption key
C) keygen
D) public key
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Electronic Communications Privacy Act (ECPA)
B) Fair Credit Reporting Act
C) Computer Fraud and Abuse Act
D) Computer Matching and Privacy Protection Act
Correct Answer
verified
Not Answered
Correct Answer
verified
Showing 1 - 20 of 181
Related Exams