question
Which of the following are used to record, save, and then execute a set of keystrokes and instructions repeatedly?
Keygens
Indices
Backdoors
Macros
Keygens
Indices
Backdoors
Macros
answer
Macros
question
What is another name for public key encryption?
controlled key encryption
virtual key encryption
asymmetric key enc
secure key enc
controlled key encryption
virtual key encryption
asymmetric key enc
secure key enc
answer
asymmetric key encryption
question
Which of the following statements is not a safeguard against the failure of hardware?
surge protectors
fault-tolerant computers
device-tracking apps
UPS
surge protectors
fault-tolerant computers
device-tracking apps
UPS
answer
device-tracking apps
question
Which term is used to describe software used by cybercriminals?
cyberware
conware
criminalware
crimeware
cyberware
conware
criminalware
crimeware
answer
crimeware
question
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
cyberextortionist
cyberterrorist
cyberextortionist
cyberterrorist
answer
cyberextortionist
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
a software license
an IT code of conduct
a software license
an IT code of conduct
answer
an IT code of conduct
question
Social engineering as it pertains to computers is?
Filtering Internet content to targeted users based on their personal preferences
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Filtering Internet content to targeted users based on their personal preferences
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
answer
...
question
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
Distributed
Site
Distributed
Site
answer
Site
question
Websites use which of the following to keep track of items in a user's shopping cart?
Session cookie
Shopping Bot
Session cookie
Shopping Bot
answer
Session Cookie
question
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Protected
Digital
Protected
Digital
answer
Digital
question
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
ENERGY STAR
SECURE ELECTRONICS
ENERGY STAR
SECURE ELECTRONICS
answer
ENERGY STAR
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
Spoofing
Phishing
Spoofing
Phishing
answer
Spoofing
question
The term, Zombie is?
A program that performs a repetitive task on a network
A computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
A program that performs a repetitive task on a network
A computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
answer
a computer or device whose owner
question
The term botnet means?
A program that performs a repetitive task on a network
A group of compromised computers connected to a network that attacks other networks
A program that performs a repetitive task on a network
A group of compromised computers connected to a network that attacks other networks
answer
A group of compromised computers connected to a network that attacks other networks
question
The term back door means?
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
a weakness in a computer or network's security system that enables criminals to gain unauthorized acces
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
a weakness in a computer or network's security system that enables criminals to gain unauthorized acces
answer
a program or set of instructions
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
Permissible
Ethical
Permissible
Ethical
answer
Ethical
question
which is not true about intellectual property rights?
The term fair use refers to the rights which creators are entitled for their work
a copyright protects any tangible form of expression
The term fair use refers to the rights which creators are entitled for their work
a copyright protects any tangible form of expression
answer
the term fair use refers to
question
Which of the following is the least likely motive for DDoS?
Spoofing
Extortion
Spoofing
Extortion
answer
Spoofing
question
How long can digital certificates be valid?
answer
Two Years
question
Which of the following can be used to create a software registration number, sometimes illegally?
BSA
Keygen
BSA
Keygen
answer
Keygen