A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker
Correct Answer
verified
Multiple Choice
A) Switch the order of characters
B) Replace characters with other characters
C) Insert or remove characters
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Vishing
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Encryption
B) Content filtering
C) Firewalls
D) Antivirus software
Correct Answer
verified
Multiple Choice
A) Dumpster texting
B) Dumpster diving
C) Trash retrieval
D) Pretexting
Correct Answer
verified
Multiple Choice
A) Firewall
B) Certificate authority
C) Online certificate
D) Digital content certificate
Correct Answer
verified
Multiple Choice
A) Counterfeit is fake technology products,where pirated is invisible technological cameras placed online.
B) Pirated is the unauthorized use,duplication,distribution,or sale of copyrighted software,where counterfeit is software that is manufactured to look like the real thing and sold as such.
C) Counterfeit is the unauthorized use,duplication,distribution,or sale of copyrighted software,where pirated is software that is manufactured to look like the real thing and sold as such.
D) Pirated is stolen software used to hack into a company's classified material,where counterfeit is a fake version of firewall software.
Correct Answer
verified
Multiple Choice
A) Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
B) A contractual stipulation to ensure that ebusiness participants do not deny their online actions
C) Sending a few emails to a specific person or system resulting in filling up the recipient's disk space
D) A contractual stipulation to ensure that ebusiness participants deny their online actions
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) Digital certificate
B) Encryption
C) Decrypt
D) Cryptography
Correct Answer
verified
Multiple Choice
A) Pharming
B) Phishing
C) Phishing expedition
D) Spear phishing
Correct Answer
verified
Multiple Choice
A) Single-factor authentication
B) Two-factor authentication
C) Multi-factor authentication
D) Biometrics
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Tracking people's activities by such measures as number of keystrokes
B) Tracking people's activities by such measures as error rate
C) Tracking people's activities by such measures as number of transactions processed
D) All of these choices
Correct Answer
verified
Multiple Choice
A) Zombie
B) Zombie farm
C) Pharming attack
D) Pharming
Correct Answer
verified
Showing 81 - 100 of 333
Related Exams