A) information theft
B) software theft
C) digital forensics
D) decryption
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
B) Antivirus software disables a virus and protects the computer or network from unauthorized access.
C) The police use a virus and other measures to take down a network of computer criminals.
D) A zombie army is used to attack computers or computer networks.
Correct Answer
verified
Multiple Choice
A) re-securing
B) decryption
C) assessment
D) digitization
Correct Answer
verified
Multiple Choice
A) a virus
B) a worm
C) a Trojan horse
D) a rootkit
Correct Answer
verified
Multiple Choice
A) The term fair use refers to the rights which creators are entitled for their work.
B) Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
C) A copyright protects any tangible form of expression.
D) Digital rights management is a strategy designed to prevent illegal distribution of digital content.
Correct Answer
verified
Multiple Choice
A) cybersleuthing
B) digital forensics
C) system analysis
D) data mining
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) online or Internet-based illegal acts
B) any illegal act involving a computer
C) a type of gaming software that simulates criminal acts
D) using the Internet to apprehend and prosecute criminals
Correct Answer
verified
Multiple Choice
A) creating consumer and personal profiles by tracking website history and electronic purchases
B) compiling data from multiple computer users in order to make predictions about computer trends
C) filtering Internet content to targeted users based on their personal preferences
D) gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Correct Answer
verified
Multiple Choice
A) script kiddie
B) cracker
C) cyberextortionist
D) cyberterrorist
Correct Answer
verified
Multiple Choice
A) No central administrator is present on the Internet.
B) It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
C) Information kept on an organization's premises has a higher security risk than information transmitted over networks.
D) Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
Correct Answer
verified
Matching
Correct Answer
Short Answer
Correct Answer
verified
Multiple Choice
A) a virus
B) a worm
C) a Trojan horse
D) a rootkit
Correct Answer
verified
Multiple Choice
A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system
Correct Answer
verified
Multiple Choice
A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist
Correct Answer
verified
Showing 81 - 100 of 200
Related Exams