Filters
Question type

Study Flashcards

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?


A) assigned
B) secure
C) protected
D) digital

Correct Answer

verifed

verified

Which of the following is not a possessed object?


A) PIN
B) badge
C) smart card
D) key

Correct Answer

verifed

verified

A(n)____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Correct Answer

verifed

verified

Into which of the following kinds of ports do external fingerprint readers plug?


A) parallel
B) MIDI
C) USB
D) serial

Correct Answer

verifed

verified

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?


A) digital security risk
B) information liability
C) technical terrorism
D) network compromise

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?


A) cyberware
B) conware
C) criminalware
D) crimeware

Correct Answer

verifed

verified

Websites use which of the following to keep track of items in a user's shopping cart?


A) session cookie
B) zombie
C) adware
D) shopping bot

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
A program that performs a repetitive task on a network.
Responses
password
CA
AUP
firewall
plaintext
Digital Millennium Copyright Act (DCMA)
web filtering software
digital security risk
piracy
iris recognition system
digital certificate
botnet
clickjacking
copyright
ciphertext
DoS attack
digital signature
bot
script kiddie
zombie

Correct Answer

password
CA
AUP
firewall
plaintext
Digital Millennium Copyright Act (DCMA)
web filtering software
digital security risk
piracy
iris recognition system
digital certificate
botnet
clickjacking
copyright
ciphertext
DoS attack
digital signature
bot
script kiddie
zombie

A(n)____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

Correct Answer

verifed

verified

disaster r...

View Answer

COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?


A) personal identification number
B) private Internet notification
C) possessed information number
D) personal information network

Correct Answer

verifed

verified

____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following is the least likely motive for a DDoS?


A) political anger
B) spoofing
C) extortion
D) negative recognition

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following does your company use to track your time and attendance?


A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
Usually does not have advanced computer and technical skills.
Responses
botnet
iris recognition system
ciphertext
CA
piracy
digital certificate
copyright
firewall
DoS attack
script kiddie
Digital Millennium Copyright Act (DCMA)
password
bot
web filtering software
digital security risk
clickjacking
zombie
digital signature
plaintext
AUP

Correct Answer

botnet
iris recognition system
ciphertext
CA
piracy
digital certificate
copyright
firewall
DoS attack
script kiddie
Digital Millennium Copyright Act (DCMA)
password
bot
web filtering software
digital security risk
clickjacking
zombie
digital signature
plaintext
AUP

One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following is NOT permissible under a single-user license agreement?


A) Jamie installs Quark Xpress on a single computer.
B) Christine leases her copy of Dreamweaver.
C) Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.
D) Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.

Correct Answer

verifed

verified

   Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure. Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following does your financial institution use to reduce fraud?


A) digital forensics system
B) iris recognition system
C) signature verification system
D) hand geometry system

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT The term, payload, as it pertains to computer crime, is defined as _____________.


A) the money a criminal receives from extortion or other computer crimes
B) the amount of data loss to a company or individual who is a victim of a computer crime
C) the destructive event or prank the program is intended to deliver
D) the financial burden computer crime places on its victims

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?


A) sending spam via email
B) spreading viruses
C) committing a distributed denial of service attack
D) authoring ActiveX scripts

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.


A) information theft
B) software theft
C) digital forensics
D) decryption

Correct Answer

verifed

verified

Showing 181 - 200 of 200

Related Exams

Show Answer