Filters
Question type

Study Flashcards

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.


A) control
B) firewall
C) check
D) lock

Correct Answer

verifed

verified

When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.


A) devastating
B) enterprise
C) organized
D) distributed

Correct Answer

verifed

verified

What is an audit trail?


A) A log of financial transactions.
B) A file that records access attempts.
C) A list of passwords and user names on a network.
D) A record of hacking attempts.

Correct Answer

verifed

verified

What does a keygen do?


A) Generates a list of user names and passwords for network administrators.
B) Creates CAPTCHA images.
C) Analyzes typing patterns to authenticate a user.
D) Creates software registration numbers.

Correct Answer

verifed

verified

Which of the following is not recommended to protect against hardware failure?


A) surge protector
B) UPS
C) cables and locks
D) duplicate components

Correct Answer

verifed

verified

IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

Correct Answer

verifed

verified

To protect files on your device's hard drive from hackers, turn on file and printer sharing.

Correct Answer

verifed

verified

A password ______ is a service that stores all of your account information securely.


A) vault
B) binder
C) manager
D) collection

Correct Answer

verifed

verified

Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

Correct Answer

verifed

verified

A(n) ______ has a goal of destroying data or stealing information.


A) hacker
B) cracker
C) script kiddie
D) cyberextortionist

Correct Answer

verifed

verified

A rootkit can be a backdoor.

Correct Answer

verifed

verified

Two users can have the same email address.

Correct Answer

verifed

verified

Public key encryption is also called asymmetric key encryption.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following best describes a back door?


A) A file recovery method that circumvents the computer or mobile device's network.
B) An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device.
C) A hardware device that reinforces security settings on a computer or network.
D) A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.

Correct Answer

verifed

verified

An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.


A) password
B) algorithm
C) code
D) key

Correct Answer

verifed

verified

The term ______ refers to online or Internet-based illegal acts.

Correct Answer

verifed

verified

cybercrime...

View Answer

List methods to protect computers, mobile devices, and networks from attacks.

Correct Answer

verifed

verified

• Use antivirus software.
• B...

View Answer

COGNITIVE ASSESSMENT Which of the following is NOT true about two-step verification?


A) Another term for it is two-factor verification.
B) When a system sends an authentication code, it typically does not expire.
C) If you sign in from a device you use frequently, you can elect to bypass two-step verification.
D) ATMs usually require a two-step verification.

Correct Answer

verifed

verified

A(n) ______ verification system compares a person's live speech with their stored speech pattern.

Correct Answer

verifed

verified

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.


A) IP
B) EULA
C) electronic profile
D) code of conduct

Correct Answer

verifed

verified

Showing 61 - 80 of 86

Related Exams

Show Answer