Filters
Question type

Study Flashcards

A rootkit can be a backdoor.

Correct Answer

verifed

verified

Encryption is one safeguard against information theft.

Correct Answer

verifed

verified

A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Correct Answer

verifed

verified

Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

Correct Answer

verifed

verified

What methods do phishing and spoofing scammers use? List methods to protect against phishing and spoofing scams.

Correct Answer

verifed

verified

Phishing and spoofing scams can be perpe...

View Answer

A(n) ______ is a program that performs a repetitive task on a network.

Correct Answer

verifed

verified

Security experts recommend using different user names and passwords for every account.

Correct Answer

verifed

verified

Describe how users and manufacturers protect against software theft.

Correct Answer

verifed

verified

To protect software media from being sto...

View Answer

A(n) ______ verification system compares a person's live speech with their stored speech pattern.

Correct Answer

verifed

verified

For what purpose was the BSA formed?


A) To promote understanding of software piracy.
B) To fight against hacktivists.
C) To create an online resource for malware protection.
D) To enforce laws against cyberterrorists.

Correct Answer

verifed

verified

User IDs are also called user names, log on names, or sign in names.

Correct Answer

verifed

verified

A(n) ______ has a goal of destroying data or stealing information.


A) hacker
B) cracker
C) script kiddie
D) cyberextortionist

Correct Answer

verifed

verified

An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.


A) password
B) algorithm
C) code
D) key

Correct Answer

verifed

verified

A(n) ______ was originally a complimentary work for a computer enthusiast.


A) hacker
B) cracker
C) script kiddie
D) cyberextortionist

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform) ?


A) emergency plan
B) recovery plan
C) restoration plan
D) building plan

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?


A) worm
B) rootkit
C) trojan horse
D) virus

Correct Answer

verifed

verified

When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.


A) devastating
B) enterprise
C) organized
D) distributed

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What should an AUP specify?


A) The acceptable use of technology by employees for personal reasons.
B) The guidelines for using licensed software.
C) A list of IP addresses known to be safe.
D) A user's personal authentication methods.

Correct Answer

verifed

verified

Public key encryption is also called asymmetric key encryption.

Correct Answer

verifed

verified

An access ______ is a security measure that defines who can access a computer, device, or network.

Correct Answer

verifed

verified

Showing 61 - 80 of 86

Related Exams

Show Answer