Filters
Question type

Study Flashcards

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?


A) Electronic Communications Privacy Act (ECPA)
B) Fair Credit Reporting Act
C) Computer Fraud and Abuse Act
D) Computer Matching and Privacy Protection Act

Correct Answer

verifed

verified

Describe botnets and denial of service attacks.

Correct Answer

verifed

verified

If you are nervous, a signature might not match the one on file in a signature verification system.

Correct Answer

verifed

verified

A(n) ____________________ agreement is the right to use software.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?


A) sending spam via email
B) spreading viruses
C) committing a distributed denial of service attack
D) authoring ActiveX scripts

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?


A) a decipher module
B) a translation tool
C) an encryption algorithm
D) a decryption key

Correct Answer

verifed

verified

FOIA enables public access to most government records.

Correct Answer

verifed

verified

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

Correct Answer

verifed

verified

back door

To protect yourself from social engineering scams, shred all sensitive or confidential documents.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following does your new smartphone use to unlock the device?


A) hand geometry system
B) face recognition system
C) iris recognition system
D) digital forensics system

Correct Answer

verifed

verified

Which of the following terms refers to making a copy of a file?


A) restoring
B) backing up
C) encrypting
D) deciphering

Correct Answer

verifed

verified

Perpetrators of back doors trick their victims into interacting with phony websites.

Correct Answer

verifed

verified

Biometric objects are entirely foolproof.

Correct Answer

verifed

verified

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?


A) ENERGY STAR
B) SECURE ELECTRONICS
C) ACCEPTABLE USE
D) GREEN COMPUTING

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT The term CAPTCHA is _____________.


A) a private combination of words associated with a user name that allows access to computer resources
B) the average time it takes a computer to discover a password based on the number of characters
C) a digital image used to help decipher a faded or blurry word in digitized news archives
D) a series of distorted characters that a user is required to enter correctly to continue using a website

Correct Answer

verifed

verified

D

COGNITIVE ASSESSMENT Which of the following can be used to create a software registration number, sometimes illegally?


A) BSA
B) decryption key
C) keygen
D) public key

Correct Answer

verifed

verified

Which of the following provides the mobile user with a secure connection to the company network server?


A) XPN
B) SPN
C) TPN
D) VPN

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following is the least likely motive for a DDoS?


A) political anger
B) spoofing
C) extortion
D) negative recognition

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What is an AUP intended to do?


A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup

Correct Answer

verifed

verified

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

Correct Answer

verifed

verified

False

Showing 1 - 20 of 181

Related Exams

Show Answer