A) diving.
B) hacking.
C) phreaking.
D) social engineering.
E) trashing.
Correct Answer
verified
Multiple Choice
A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
Correct Answer
verified
Multiple Choice
A) on a hard disk.
B) on a floppy disk.
C) on a CD-ROM.
D) in an email attachment.
E) All of the above
Correct Answer
verified
Multiple Choice
A) an activist group that promotes the interests of the Recording Industry Association of America.
B) a loosely organized group of hacktivists that claimed responsibility for a DDoS attack on Church of Scientology Web sites.
C) the name given to the People's Liberation Army group that was responsible for more than 100 intrusions around the world.
D) the name of the group that launched the Stuxnet worm.
E) All of the above except c.
Correct Answer
verified
Multiple Choice
A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
Correct Answer
verified
Multiple Choice
A) John Barlow.
B) Katie Hafner.
C) John Markoff.
D) Robert Morris, Jr..
E) Bruce Sterling.
Correct Answer
verified
Multiple Choice
A) bot.
B) spoof.
C) vampire.
D) virus.
E) worm.
Correct Answer
verified
Multiple Choice
A) it is Cuba's first attempt at cyberwarfare.
B) it is the fastest spreading worm of all time.
C) it shut down the White House Web site for three days.
D) computer experts have found it particularly difficult to eradicate.
E) All of the above.
Correct Answer
verified
Multiple Choice
A) a bombing run.
B) a curtain closer.
C) a denial-of-service attack.
D) an electronic overdose.
E) phreaking.
Correct Answer
verified
Multiple Choice
A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
Correct Answer
verified
Multiple Choice
A) hack.
B) rogue.
C) Trojan horse.
D) virus.
E) worm.
Correct Answer
verified
Multiple Choice
A) accountability.
B) authentication.
C) authorization.
D) debugging.
E) social engineering.
Correct Answer
verified
Showing 1 - 12 of 12
Related Exams