1.
The term ____ refers to online or Internet-based illegal acts.
A) malicious-logic program
B) computer crime
C) cybercrime
D) system failure
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | C |
2.
A(n) ____ copies all of the files in a computer.
A) full backup
B) incremental backup
C) differential backup
D) selective backup
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | A |
3.
Web sites use a ____ to keep track of items in a user’s shopping cart.
A) session cookie
B) zombie
C) adware
D) shopping bot
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | A |
4.
Many businesses use ____ to limit employees’ Web access.
A) content filtering
B) Web bugs
C) honeypots
D) spyware
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | A |
5.
Computer forensics is used by ____.
A) military intelligence
B) insurance agencies
C) law enforcement
D) all of the above
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | D |
6.
The term ____, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.
A) hacker
B) cyberterrorist
C) script kiddie
D) cyberstalker
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | A |
7.
A computer ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
A) signature
B) virus
C) definition
D) spim
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | B |
8.
A virus ____ is a known specific pattern of virus code.
A) index
B) signature
C) glossary
D) master
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | B |
9.
A(n) ____ agreement is the right to use software.
A) user
B) master
C) authenticating
D) license
Points Earned: | 0.0/1.0 | |
Correct Answer(s): | D |
10.
One of the more popular e-mail encryption programs is called ____, which is freeware for personal, noncommercial users.
A) IMP
B) TCP
C) DoS
D) PGP
Points Earned: | 1.0/1.0 | |
Correct Answer(s): | D |
No comments:
Post a Comment