Filters
Question type

Study Flashcards

COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?


A) script kiddie
B) cracker
C) cyberextortionist
D) cyberterrorist

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

  As shown in the accompanying figure, which of the following kinds of program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files? A)  hoax B)  secure C)  antivirus D)  antispyware As shown in the accompanying figure, which of the following kinds of program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files?


A) hoax
B) secure
C) antivirus
D) antispyware

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Discuss the four types of software theft.

Correct Answer

verifed

verified

Which of the following category of rights are the rights to which creators are entitled for their work?


A) Community property
B) Intellectual property
C) Creative
D) Ethical

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Your roommate is complaining about sore eyes and blurred vision after prolonged computer use. What computer-related disorder may she have?


A) CVS
B) RSI
C) OSHA
D) CBT

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

To do this to a file means to make a copy of it. What is the term in question?


A) restore
B) back up
C) concatenate
D) decipher

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?


A) script kiddie
B) cracker
C) cyberextortionist
D) cyberterrorist

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?


A) The CERT/CC is a federally funded Internet security research and development center.
B) It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
C) Information kept on an organization's premises has a higher security risk than information transmitted over networks.
D) An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Users may have this disorder if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. What is the name of this disorder?


A) OMS
B) EMV
C) CVS
D) VCS

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

What is the term for the prolonged malfunction of a computer?


A) dynamic collapse
B) online hash
C) processor spike
D) system failure

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following statements is not true about protecting yourself against computer viruses?


A) If a trusted source sends you an e-mail with an attachment you are not expecting, it is safe to open it because you know the sender.
B) When you purchase a new computer, it often includes anti-virus software.
C) A trusted source is an organization or person you believe will not send a virus infected file knowingly.
D) Some viruses are hidden in macros, which are instructions saved in software such as a word processing program.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A UPS for a personal computer should provide about 24 hours of use in the event of a total power loss.

A) True
B) False

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?


A) a decipher module
B) a translation tool
C) an encryption algorithm
D) a decryption key

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.

Correct Answer

verifed

verified

Which of the following software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions) , and notifies a network administrator of suspicious behavior patterns or system breaches?


A) Violation assessment
B) Password authentication
C) Intrusion detection
D) Traffic management

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe junk mail sent via VoIP.


A) spim
B) spit
C) spax
D) spoof

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

  As shown in the accompanying figure, which of the following is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once? A)  Hash B)  Spam C)  Worm D)  Spike As shown in the accompanying figure, which of the following is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once?


A) Hash
B) Spam
C) Worm
D) Spike

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Web sites use which of the following to keep track of items in a user's shopping cart?


A) session cookie
B) zombie
C) adware
D) shopping bot

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a Web server stores on your computer?


A) a breadcrumb
B) a nugget
C) a cracker
D) a cookie

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Audit trails only record unsuccessful access attempts.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 181

Related Exams

Show Answer