Correct Answer
verified
Multiple Choice
A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Multiple Choice
A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
Correct Answer
verified
Multiple Choice
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.
Correct Answer
verified
Multiple Choice
A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
Multiple Choice
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
Correct Answer
verified
Multiple Choice
A) Information code
B) Information technology
C) Information management
D) Information governance
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
Correct Answer
verified
Multiple Choice
A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Information codes
B) Information management
C) Information deployment
D) Information security
Correct Answer
verified
Multiple Choice
A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III
Correct Answer
verified
Showing 41 - 60 of 132
Related Exams