MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
practice
Chpt 9 Quiz
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
Report Question
0%
Rogue
0%
Copyright
0%
Cracker
0%
Keystroke logger
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away"
Report Question
0%
Digital Millennium Copyright Act
0%
Computer Fraud and Abuse Act
0%
Freedom of Information Act
0%
Denial of service attack
Which of the following is the most widely used wireless network encryption for home wireless networks?
Report Question
0%
Ad-Aware
0%
Keeping the same password on all systems consistently
0%
Worm
0%
WPA2
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
Report Question
0%
Encryption
0%
Cyberbullying
0%
Internet scam
0%
Keystroke logger
This law gives you the right to look at your personal records held by government agencies.
Report Question
0%
Freedom of Information Act
0%
Computer Fraud and Abuse Act
0%
Denial of service attack
0%
Digital Millennium Copyright Act
Which of the following is not a measure to protect computer security?
Report Question
0%
Internet scam
0%
Keeping the same password on all systems consistently
0%
Ad-Aware
0%
WPA2
These are used by advertisers to keep track of your web activity as you move from one site to the next.
Report Question
0%
Third-party cookies
0%
Cyberbullying
0%
Privacy mode
0%
Employee-monitoring software
Which of the following is not malware?
Report Question
0%
Keeping the same password on all systems consistently
0%
WPA2
0%
Ad-Aware
0%
spyware
A program that replicates itself and clogs computers and networks.
Report Question
0%
WPA2
0%
spyware
0%
information resellers
0%
Worm
People that collect and sell personal data are called _______.
Report Question
0%
information resellers
0%
Worm
0%
Trojan horses
0%
Digital rights management (DRM)
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
Report Question
0%
Freedom of Information Act
0%
Denial of service attack
0%
Digital Millennium Copyright Act
0%
Dictionary attack
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
Report Question
0%
Cyberbullying
0%
Encryption
0%
Keystroke logger
0%
Internet scam
A(n) _______ acts as a security buffer between a corporation's private network and all external networks.
Report Question
0%
firewall
0%
privacy
0%
spyware
0%
Copyright
Corporations often use this to prevent copyright violations.
Report Question
0%
Keeping the same password on all systems consistently
0%
Digital rights management (DRM)
0%
information resellers
0%
Data security
_______ is concerned with protecting software and data from unauthorized tampering or damage.
Report Question
0%
Trojan horses
0%
Privacy mode
0%
Cyberbullying
0%
Data security
Which among the following is a way to shut down an ISP or website?
Report Question
0%
Denial of service attack
0%
Dictionary attack
0%
Digital Millennium Copyright Act
0%
Freedom of Information Act
Computer criminals that create and spread viruses are punished under this law.
Report Question
0%
Digital Millennium Copyright Act
0%
Freedom of Information Act
0%
Digital rights management (DRM)
0%
Computer Fraud and Abuse Act
Programs used to secretly record an individual's activities on the Internet are called _______.
Report Question
0%
spyware
0%
privacy
0%
Copyright
0%
Worm
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
Report Question
0%
Copyright
0%
Cracker
0%
Rogue
0%
cookies
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page