A) content filtering, encryption, and firewalls
B) calculating, locking, and firewalls
C) content prohibiting, and cookies
D) None of these are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) insiders to hack into the college system
B) dumpster diving to find usernames and passwords
C) viruses and worms to spread through the college system
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) a problem that occurs when someone registers purposely misspelled variations of well-known domain names
B) the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
C) government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
D) an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Correct Answer
verified
Multiple Choice
A) a nonrepudiation clause
B) a repudiation clause
C) a confidentiality clause
D) an employee use clause
Correct Answer
verified
Multiple Choice
A) phone number
B) social Security number
C) address
D) driver's license number
Correct Answer
verified
Multiple Choice
A) cracker
B) white-hat hacker
C) script bunnies
D) black-hat hacker
Correct Answer
verified
Multiple Choice
A) unlimited access for personal devices.
B) access only to nonsensitive systems and datA.
C) access, but preventing local storage of data on personal devices.
D) All of these are correct.
Correct Answer
verified
Multiple Choice
A) Counterfeit is fake technology products, where pirated is invisible technological cameras placed online.
B) Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such.
C) Counterfeit is the unauthorized use, duplication, distribution, or sale of copyrighted software, where pirated is software that is manufactured to look like the real thing and sold as such.
D) Pirated is stolen software used to hack into a company's classified material, where counterfeit is a fake version of firewall software.
Correct Answer
verified
Multiple Choice
A) the electronic defacing of an existing website
B) the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
C) a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
D) an act or object that poses a danger to assets
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) typosquatting
B) website name stealing
C) internet censorship
D) teergrubing
Correct Answer
verified
Multiple Choice
A) zombie
B) zombie farm
C) pharming attack
D) time bomb
Correct Answer
verified
Multiple Choice
A) the act of conforming, acquiescing, or yielding information
B) a method or system of government for information management or control
C) the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
Correct Answer
verified
Multiple Choice
A) adoption and implementation of an anti-spam policy
B) notice and disclosure
C) choice and quality
D) None of these are correct.
Correct Answer
verified
Multiple Choice
A) power outages
B) tornados
C) a system upgrade
D) network failure
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) firewall
B) digital certificate
C) virus software
D) antivirus software
Correct Answer
verified
Multiple Choice
A) downtime
B) MIS down
C) direct data loss
D) downtown
Correct Answer
verified
Multiple Choice
A) prevention and resistance
B) detection and authorizing
C) detection and response
D) authentication and authorization
Correct Answer
verified
Showing 21 - 40 of 331
Related Exams