Filters
Question type

Study Flashcards

COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.


A) information theft
B) software theft
C) digital forensics
D) decryption

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Describe botnets and denial of service attacks.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

COGNITIVE ASSESSMENT What happens during a DDoS attack?


A) An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
B) Antivirus software disables a virus and protects the computer or network from unauthorized access.
C) The police use a virus and other measures to take down a network of computer criminals.
D) A zombie army is used to attack computers or computer networks.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

To read encrypted data, the recipient must decipher it into a readable form.What is the term for this process?


A) re-securing
B) decryption
C) assessment
D) digitization

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?


A) a virus
B) a worm
C) a Trojan horse
D) a rootkit

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?


A) The term fair use refers to the rights which creators are entitled for their work.
B) Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
C) A copyright protects any tangible form of expression.
D) Digital rights management is a strategy designed to prevent illegal distribution of digital content.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?


A) cybersleuthing
B) digital forensics
C) system analysis
D) data mining

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

Correct Answer

verifed

verified

    As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network. As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

A) True
B) False

Correct Answer

verifed

verified

During virtual browsing, your browser does not keep track of the websites you are visiting.

A) True
B) False

Correct Answer

verifed

verified

Combating cybercrime is not one of the FBI's top priorities.

A) True
B) False

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?


A) online or Internet-based illegal acts
B) any illegal act involving a computer
C) a type of gaming software that simulates criminal acts
D) using the Internet to apprehend and prosecute criminals

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.


A) creating consumer and personal profiles by tracking website history and electronic purchases
B) compiling data from multiple computer users in order to make predictions about computer trends
C) filtering Internet content to targeted users based on their personal preferences
D) gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?


A) script kiddie
B) cracker
C) cyberextortionist
D) cyberterrorist

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?


A) No central administrator is present on the Internet.
B) It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
C) Information kept on an organization's premises has a higher security risk than information transmitted over networks.
D) Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
Makes it illegal to circumvent antipiracy schemes in commercial software.
Responses
iris recognition system
piracy
Digital Millennium Copyright Act (DCMA)
clickjacking
CA
digital signature
ciphertext
digital certificate
DoS attack
password
plaintext
web filtering software
botnet
script kiddie
AUP
digital security risk
bot
copyright
zombie
firewall

Correct Answer

iris recognition system
piracy
Digital Millennium Copyright Act (DCMA)
clickjacking
CA
digital signature
ciphertext
digital certificate
DoS attack
password
plaintext
web filtering software
botnet
script kiddie
AUP
digital security risk
bot
copyright
zombie
firewall

To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?


A) a virus
B) a worm
C) a Trojan horse
D) a rootkit

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?


A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Showing 81 - 100 of 200

Related Exams

Show Answer