Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) a private combination of words associated with a user name that allows access to computer resources
B) the average time it takes a computer to discover a password based on the number of characters
C) a digital image used to help decipher a faded or blurry word in digitized news archives
D) a series of distorted characters that a user is required to enter correctly to continue using a website
Correct Answer
verified
Multiple Choice
A) content filtering
B) information monitoring
C) data mining
D) social profiling
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) No central administrator is present on the Internet.
B) It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
C) Information kept on an organization's premises has a higher security risk than information transmitted over networks.
D) Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
Correct Answer
verified
Multiple Choice
A) the access point a hacker uses to intrude on a computer or network
B) a program that searches for cybercriminals by looking for patterns in attacks
C) hardware and/or software that protects a network's resources from intrusion
D) a virus that prevents the computer or network from accessing outside resources
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) the area of memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attacks in the future
B) a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
C) the vulnerabilities of a computer criminal or criminal network that enable them to be tracked and caught
D) a weakness in a computer or network's security system that enables criminals to gain unauthorized access
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) W3C
B) NSF
C) CERT/CC
D) Internet2
Correct Answer
verified
Showing 101 - 120 of 200
Related Exams