Filters
Question type

Study Flashcards

Which term is used to describe software used by cybercriminals?


A) cyberware
B) conware
C) criminalware
D) crimeware

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.

A) True
B) False

Correct Answer

verifed

verified

Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.

A) True
B) False

Correct Answer

verifed

verified

In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. ​ Which of the following is NOT a question of technology ethics? In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. ​ Which of the following is NOT a question of technology ethics?

Correct Answer

verifed

verified

In order to safeguard your personal information, which of the following is recommended?


A) Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them.
B) Clear your history file when you are finished browsing.
C) Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase.
D) Use shopping club and buying cards when shopping to remain anonymous.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

B

What is the term for a website that uses encryption techniques to protect its data?


A) virtual site
B) locked site
C) secure site
D) vault

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?


A) assigned
B) secure
C) protected
D) digital

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A(n) ____________________ agreement is the right to use software.

Correct Answer

verifed

verified

license

​ What type of software restricts access to specified websites?


A) spam filtering
B) net filtering
C) web filtering
D) phishing

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Which of the following is the least likely motive for a DDoS?


A) political anger
B) spoofing
C) extortion
D) negative recognition

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.

A) True
B) False

Correct Answer

verifed

verified

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?


A) malware
B) untrusted sources
C) threats
D) cybermalls

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is the process of restricting access to certain material on the web?


A) text remastering
B) content filtering
C) indexing
D) material masking

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

B

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

A) True
B) False

Correct Answer

verifed

verified

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

Correct Answer

verifed

verified

Student responses will vary, but should ...

View Answer

Internet advertising firms often use which of the following to collect information about users web browsing habits?


A) comware
B) postware
C) spyware
D) billware

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition. a. digital signature b. digital certificate c. CA d. digital security risk e. firewall f. botnet g. zombie h. clickjacking i. Digital Millennium Copyright Act (DCMA) j. DoS attack k. AUP l. iris recognition system m. web filtering software n. password o. script kiddie p. ciphertext q. plaintext r. bot s. piracy t. copyright -A program that performs a repetitive task on a network.

Correct Answer

verifed

verified

​ According to some estimates, ____ mobile phones are lost or stolen in the United States every minute.


A) 1130
B) 57
C) 113
D) 943

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The most common type of license included with software purchased by individual users is a(n) ____________________.

Correct Answer

verifed

verified

end-user license agreementEULA...

View Answer

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?


A) a software license
B) an IT code of conduct
C) digital rights management
D) fair use

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 200

Related Exams

Show Answer