This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
  • Rogue
  • Copyright
  • Cracker
  • Keystroke logger
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away"
  • Digital Millennium Copyright Act
  • Computer Fraud and Abuse Act
  • Freedom of Information Act
  • Denial of service attack
Which of the following is the most widely used wireless network encryption for home wireless networks?
  • Ad-Aware
  • Keeping the same password on all systems consistently
  • Worm
  • WPA2
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
  • Encryption
  • Cyberbullying
  • Internet scam
  • Keystroke logger
This law gives you the right to look at your personal records held by government agencies.
  • Freedom of Information Act
  • Computer Fraud and Abuse Act
  • Denial of service attack
  • Digital Millennium Copyright Act
Which of the following is not a measure to protect computer security?
  • Internet scam
  • Keeping the same password on all systems consistently
  • Ad-Aware
  • WPA2
These are used by advertisers to keep track of your web activity as you move from one site to the next.
  • Third-party cookies
  • Cyberbullying
  • Privacy mode
  • Employee-monitoring software
Which of the following is not malware?
  • Keeping the same password on all systems consistently
  • WPA2
  • Ad-Aware
  • spyware
A program that replicates itself and clogs computers and networks.
  • WPA2
  • spyware
  • information resellers
  • Worm
People that collect and sell personal data are called _______.
  • information resellers
  • Worm
  • Trojan horses
  • Digital rights management (DRM)
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
  • Freedom of Information Act
  • Denial of service attack
  • Digital Millennium Copyright Act
  • Dictionary attack
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
  • Cyberbullying
  • Encryption
  • Keystroke logger
  • Internet scam
A(n) _______ acts as a security buffer between a corporation's private network and all external networks.
  • firewall
  • privacy
  • spyware
  • Copyright
Corporations often use this to prevent copyright violations.
  • Keeping the same password on all systems consistently
  • Digital rights management (DRM)
  • information resellers
  • Data security
_______ is concerned with protecting software and data from unauthorized tampering or damage.
  • Trojan horses
  • Privacy mode
  • Cyberbullying
  • Data security
Which among the following is a way to shut down an ISP or website?
  • Denial of service attack
  • Dictionary attack
  • Digital Millennium Copyright Act
  • Freedom of Information Act
Computer criminals that create and spread viruses are punished under this law.
  • Digital Millennium Copyright Act
  • Freedom of Information Act
  • Digital rights management (DRM)
  • Computer Fraud and Abuse Act
Programs used to secretly record an individual's activities on the Internet are called _______.
  • spyware
  • privacy
  • Copyright
  • Worm
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
  • Copyright
  • Cracker
  • Rogue
  • cookies
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0