Description of this paper

computer concept




Multiple Choice;Identify the choice that best completes the statement or answers the question.;1.;Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?;a.;digital security risk;c.;technical terrorism;b.;information liability;d.;network compromise;2.;Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?;a.;hacker;c.;cyberextortionist;b.;script kiddie;d.;cyberterrorist;3.;Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?;a.;malware;c.;threats;b.;untrusted sources;d.;cybermalls;4.;What is the term for a program that performs a repetitive task on a network?;a.;zombie;c.;bot;b.;rootkit;d.;Trojan horse;5.;In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?;a.;distributed;c.;limited;b.;delayed;d.;staggered;6.;A ________ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.;a.;Trojan horse;c.;Zombie;b.;Back door;d.;Botnet;7.;Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?;a.;rebuking;c.;transmitting;b.;spoofing;d.;victimizing;8.;Which of the following is a federally funded Internet security research and development center?;a.;W3C;c.;CERT/CC;b.;NSF;d.;Internet2;9.;Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?;a.;keygens;c.;backdoors;b.;indices;d.;macros;10.;A _______ is hardware and/or software that protects a network?s resources from intrusion by users on another network such as the Internet.;a.;Great wall;c.;Firewall;b.;Back door;d.;Botnet;11.;Which of the following is not a possessed object?;a.;PIN;c.;smart card;b.;badge;d.;key;COGNITIVE ASSESSMENT;12.;The term CAPTCHA is _____________.;a.;a private combination of words associated with a user name that allows access to computer resources;b.;the average time it takes a computer to discover a password based on the number of characters;c.;a digital image used to help decipher a faded or blurry word in digitized news archives;d.;a series of distorted characters that a user is required to enter correctly to continue using a website;13.;Which of the following statements is not true about biometric devices?;a.;Personal characteristics are unique and cannot be forgotten or misplaced.;b.;Biometric devices are an unreliable method of identification and notification.;c.;Examples include fingerprint readers and hand geometry systems.;d.;Biometric devices translate a personal characteristic into a digital code.;14.;What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?;a.;cybersleuthing;c.;system analysis;b.;digital forensics;d.;data mining;15.;In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?;a.;substitution;c.;expansion;b.;transposition;d.;compaction;16.;Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?;a.;a certificate authority;c.;an encryption key;b.;a digital signature;d.;a hash;17.;Which of the following statements is not true about intellectual property rights?;a.;The term fair use refers to the rights which creators are entitled for their work.;b.;Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.;c.;A copyright protects any tangible form of expression.;d.;Digital rights management is a strategy designed to prevent illegal distribution of digital content.;18.;Which of the following terms is used to describe a small text file that a web server stores on your computer?;a.;a breadcrumb;c.;a cracker;b.;a nugget;d.;a cookie;19.;Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?;a.;CAN-SPAM Act;c.;COPPA


Paper#71005 | Written in 18-Jul-2015

Price : $27