Correct Answer
verified
Multiple Choice
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
Correct Answer
verified
Multiple Choice
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
Multiple Choice
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Correct Answer
verified
Multiple Choice
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
Correct Answer
verified
Multiple Choice
A) Power outages
B) Tornadoes
C) A system upgrade
D) Network failure
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware
Correct Answer
verified
Multiple Choice
A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of these
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker
Correct Answer
verified
Multiple Choice
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Correct Answer
verified
Multiple Choice
A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs
Correct Answer
verified
Showing 61 - 80 of 132
Related Exams