A) assigned
B) secure
C) protected
D) digital
Correct Answer
verified
Multiple Choice
A) PIN
B) badge
C) smart card
D) key
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) parallel
B) MIDI
C) USB
D) serial
Correct Answer
verified
Multiple Choice
A) digital security risk
B) information liability
C) technical terrorism
D) network compromise
Correct Answer
verified
Multiple Choice
A) cyberware
B) conware
C) criminalware
D) crimeware
Correct Answer
verified
Multiple Choice
A) session cookie
B) zombie
C) adware
D) shopping bot
Correct Answer
verified
Matching
Correct Answer
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) personal identification number
B) private Internet notification
C) possessed information number
D) personal information network
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) political anger
B) spoofing
C) extortion
D) negative recognition
Correct Answer
verified
Multiple Choice
A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system
Correct Answer
verified
Matching
Correct Answer
Multiple Choice
A) Jamie installs Quark Xpress on a single computer.
B) Christine leases her copy of Dreamweaver.
C) Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.
D) Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) digital forensics system
B) iris recognition system
C) signature verification system
D) hand geometry system
Correct Answer
verified
Multiple Choice
A) the money a criminal receives from extortion or other computer crimes
B) the amount of data loss to a company or individual who is a victim of a computer crime
C) the destructive event or prank the program is intended to deliver
D) the financial burden computer crime places on its victims
Correct Answer
verified
Multiple Choice
A) sending spam via email
B) spreading viruses
C) committing a distributed denial of service attack
D) authoring ActiveX scripts
Correct Answer
verified
Multiple Choice
A) information theft
B) software theft
C) digital forensics
D) decryption
Correct Answer
verified
Showing 181 - 200 of 200
Related Exams