A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Drive-by hacking
C) Polymorphic viruses and worms
D) Hacker
Correct Answer
verified
Multiple Choice
A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Smart technology card
B) Tokens
C) Biometrics
D) Passwords
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cyberbullying
B) Fair information practices
C) Click-fraud
D) Bring Your Own Device
Correct Answer
verified
Multiple Choice
A) Mail bomb
B) Spam
C) Intellectual spam
D) Junk mail
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An Insider
B) Dumpster diving
C) Social engineering
D) Phishing
Correct Answer
verified
Multiple Choice
A) The electronic defacing of an existing website.
B) The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
C) A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
D) An act or object that poses a danger to assets.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
Correct Answer
verified
Multiple Choice
A) Personally identifiable information (PII)
B) Nonsensitive PII
C) Sensitive PII
D) Sock puppet marketing
Correct Answer
verified
Multiple Choice
A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) Passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Correct Answer
verified
Multiple Choice
A) Opt out
B) Opt in
C) BYOD
D) Nonrepudiation
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
Showing 181 - 200 of 354
Related Exams