Filters
Question type

Study Flashcards

Encryption is one safeguard against information theft.

Correct Answer

verifed

verified

Which of the following is not a green computing recommendation?


A) Consolidate servers by using virtualization.
B) Use outside air to cool the data center when possible.
C) Purchase low-efficiency equipment.
D) Use sleep modes and other power management features.

Correct Answer

verifed

verified

A(n) ______ demands payment to stop an attack.


A) hacker
B) cracker
C) script kiddie
D) cyberextortionist

Correct Answer

verifed

verified

A hand geometry system measures the size and shape of a person's hand.

Correct Answer

verifed

verified

Describe how users and manufacturers protect against software theft.

Correct Answer

verifed

verified

To protect software media from being sto...

View Answer

Define the following as they pertain to encryption: plaintext, ciphertext, encryption algorithm, encryption key. Differentiate between private and public key encryption.

Correct Answer

verifed

verified

In the encryption process, the unencrypt...

View Answer

Piracy is the most common form of software theft.

Correct Answer

verifed

verified

Security experts recommend using different user names and passwords for every account.

Correct Answer

verifed

verified

An access ______ is a security measure that defines who can access a computer, device, or network.

Correct Answer

verifed

verified

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie.

Correct Answer

verifed

verified

Malware is short for ______ software.


A) malicious
B) malignant
C) malevolent
D) malady

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?


A) worm
B) rootkit
C) trojan horse
D) virus

Correct Answer

verifed

verified

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person.


A) manipulation
B) engineering
C) hacking
D) misdirection

Correct Answer

verifed

verified

What methods do phishing and spoofing scammers use? List methods to protect against phishing and spoofing scams.

Correct Answer

verifed

verified

Phishing and spoofing scams can be perpe...

View Answer

Content filtering is the process of restricting access to certain material.

Correct Answer

verifed

verified

An encryption ______ is a set of steps that converts readable text into unreadable text.


A) series
B) algorithm
C) method
D) key

Correct Answer

verifed

verified

Describe the reasons for and methods of two-step verification processes. What information should a user use to register?

Correct Answer

verifed

verified

In an attempt to further protect persona...

View Answer

Another term for botnet is ______ army.


A) ghost
B) vampire
C) zombie
D) spy

Correct Answer

verifed

verified

Viruses, worms, and trojan horses replicate themselves to other computers or devices.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What should an AUP specify?


A) The acceptable use of technology by employees for personal reasons.
B) The guidelines for using licensed software.
C) A list of IP addresses known to be safe.
D) A user's personal authentication methods.

Correct Answer

verifed

verified

Showing 21 - 40 of 86

Related Exams

Show Answer