In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? |
substitution |
Which of the following can be used to create a software registration number, sometimes illegally? |
keygen |
Which of the following is a federally funded Internet security research and development center? |
CERT/CC |
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public? |
Electronic Communication Privacy Act |
Which of the following does your financial institution use to reduce fraud? |
signature verification system hand geometry system |
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer? |
cookie |
Which of the following is an authorized person or company that issues and verifies digital certificates? |
certificate authority |
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly? |
macros |
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations? |
malware |
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process? |
product activation |
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge? |
script kiddie |
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously? |
network |
Which of the following can be used to create a software registration number, sometimes illegally? |
keygen |
Which of the following statements is not true about Internet and network attacks? |
Information kept on an organization’s premises has a higher security risk than information transmitted over networks. Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing. |
The term, payload, as it pertains to computer crime, is defined as _____________. |
the destructive event or prank the program is intended to deliver the financial burden computer crime places on its victims |
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? |
digital forensics |
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use? |
transposition |
Which of the following is the least likely motive for a DDoS? |
spoofing |
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions? |
Caesar cipher |
Websites use which of the following to keep track of items in a user’s shopping cart? |
session cookie |
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender? |
a digital signature |
Which of the following does your company use to track your time and attendance? |
hand geometry system |
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? |
substitution |
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action? |
cracker |
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program? |
clickjacking |
Which of the following statements is not true about Internet and network attacks? |
Information kept on an organization’s premises has a higher security risk than information transmitted over networks. |
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext? |
an encryption algorithm |
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge? |
script kiddie |
The term firewall is _____________. |
Correct hardware and/or software that protects a network’s resources from intrusion |
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts? |
an audit trail |
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process? |
product activation |
Which term is used to describe software used by cybercriminals? |
crimeware |
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed? |
backup |
Which of the following best describes the term, cybercrime? |
online or Internet-based illegal acts |
Websites use which of the following to keep track of items in a user’s shopping cart? |
session cookie |
What is another name for public key encryption? |
asymmetric key encryption |
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? |
an IT code of conduct |
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos? |
IP |
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? |
digital forensics |
The term, botnet, means _____________. |
a group of compromised computers connected to a network that attacks other networks |
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? |
They restore the files. |
What is an EULA intended to do? |
license software for individual use |
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? |
ethical |
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service? |
voice verification system |
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail? |
Electronic Communications Privacy Act (ECPA) |
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information? |
phishing |
Which of the following statements is not true about Internet and network attacks? |
Information kept on an organization’s premises has a higher security risk than information transmitted over networks |
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network? |
a worm |
Which of the following categories are the rights to which creators are entitled for their work? |
intellectual property |
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext? |
an encryption algorithm |
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer? |
a rootkit |
The term, zombie, is _____________. |
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider |
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action? |
cracker |
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? |
substitution |
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons? |
cyberterrorist |
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? |
decryption |
Many businesses use which of the following to limit employees’ web access? |
content filtering |
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters? |
password |
Which term is used to describe software used by cybercriminals? |
crimeware |
Which of the following terms means in a location separate from the computer site? |
off-site |
Which of the following is the least likely motive for a DDoS? |
spoofing |
Which of the following is an authorized person or company that issues and verifies digital certificates? |
certificate authority |
Which of the following best describes the term, cybercrime? |
online or Internet-based illegal acts |
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge? |
script kiddie |
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons? |
cyberterrorist |
Which of the following does your financial institution use to reduce fraud? |
signature verification system |
Which of the following can transmit germs? |
hand geometry systems |
What happens during a DDoS attack? |
A zombie army is used to attack computers or computer networks. |
What term is used to illustrate the gap between those with and those without access to technology? |
digital divide |
Which of the following gestures would you use if you want to run a new browser app on your new tablet? |
double-tap |
Which of the following is an electronic version of a printed book, readable on computers and other digital devices? |
e-book |
Which of the following works in a manner similar to a copy machine? |
scanner |
Which of the following category of users works on a computer while away from a main office, home office, or school? |
mobile |
What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them? |
software |
Which of the following conveys meaning and is useful to users? |
information |
In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of choice? |
point |
Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet? |
press and hold |
Which of the following is true about a computer? |
Its electronic components process data using instructions. |
Which of the following is NOT a suggestion for easing eyestrain while using a mobile device? |
Position the display about 90 degrees below eye level. |
What is a type of personal computer designed so all of its components fit entirely on or under a desk or table? |
desktop computer |
You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as? |
cloud storage |
How often should you change your password? |
Every three months |
A leading maker of security software has made a claim that its software blocked a given number of malware attacks in a single year. From your knowledge of malware, which of the following is the likeliest number from that claim? |
5 billion |
Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet? |
press and hold |
If a tablet has no keyboard, how do you type on it? |
You use an on-screen keyboard. |
Which of the following is a specification that enables web content to be distributed to subscribers? |
RSS |
You interact with a program through which of the following, thereby controlling how you enter data and instructions and how information is displayed on the screen? |
operating system |
In which of the following mouse operations do you press and release the secondary mouse button? |
right click |
Which of the following is NOT a type of message you can send with a smartphone? |
media message |
Which of the following terms is an alternate term for the kind of computer shown in the accompanying figure? |
thinbook |
Which of the following gestures would you use if you want to activate a link on your new tablet? |
tap |
Which of the following enables users to speak to other users over the Internet? |
IM |
In which of the following mouse operations do you point to an item, hold down the left mouse button, move the item to the desired location on the screen, and then release the left mouse button? |
Drag |
Which kind of user requires the capabilities of a powerful computer? |
power |
How do you determine which type of computer — tablet, laptop, or desktop — is best? |
it depends on your needs |
What involves reducing the electricity consumed and environmental waste generated when using a computer? |
green computing |
Your smartphone allows you to take and store photos, and play and view your digital media. What is this overlap of technologies called? |
convergence |
Which of the following is NOT a strategy that supports green computing? |
creating web apps instead of desktop apps |
Who is Microsoft’s founder? |
Bill Gates |
If you are looking for an online social network that allows you to share messages and interests with family and friends, which of the following is the best match for you? |
|
Which type of disc is a type of storage media that consists of a flat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser? |
optical |
Which of the following mouse operations would you use if you want to display a shortcut menu? |
right-click |
Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media? |
network |
Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use? |
computer |
Which of the following is not one of the reasons that a mobile device can be categorized as a computer? |
it can accept output |
Which of the following is a popular social networking site? |
|
In which gesture do you move two fingers together? |
pinch |
Most computers and many mobile devices, such as smartphones and portable media players, can connect to which kind of network? |
wi-fi |
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software? |
application software |
Which of the following is a typical size for a game console? |
four pounds |
Green computing involves reducing electricity consumed and environmental waste generated when using a computer. Which of the following is a valid strategy for supporting green computing? |
Buy a computer from a retailer who will dispose of your old computer properly |
Which of the following gestures would you use if you want to move an item around the screen on your new tablet? |
slide |
A website’s home page is most analogous to which of the following? |
cover of a book |
Your sister just started a company that provides individuals and organizations access to the Internet for a small fee. Which of the following describes her company? |
access provider |
You have a new web app and the host for it is going to provide storage for your data on their server. What is this called? |
cloud storage |
What separates the components of a domain name? |
periods |
Which of the following allows access to high-speed Internet services through the cable television network? |
cable modem |
Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online? |
nettiquette |
Which of the following is a technology that provides high-speed Internet connection using the telephone network? |
DSL |
Which of the following is a technology that provides high-speed Internet connection using the telephone network? |
A Wi-Fi’s Internet service can be dial-up access. |
What are two elements found in an email address? |
user name and domain name |
What is the role of the W3C? |
oversee research and set standards for many areas of the Internet |
Which of the following is a group of email names and addresses used for mass distribution of a message? |
email list |
Which of the following is a component of a Uniform Resource Locator? |
domain name |
For which of the following to work must both parties be online at the same time, and the receiver of a message be willing to accept messages? |
instant messaging |
Which of the following communicates with a satellite dish to provide high-speed Internet connections via satellite? |
satellite modem |
1-5
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price