Multiple Choice
Identify the choice that best completes the statement or answers the question. | ||||||||||
1.
|
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
| |||||||||
2.
|
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
| |||||||||
3.
|
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
| |||||||||
4.
|
What is the term for a program that performs a repetitive task on a network?
| |||||||||
5.
|
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
| |||||||||
6.
|
A ________ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
| |||||||||
7.
|
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
| |||||||||
8.
|
Which of the following is a federally funded Internet security research and development center?
| |||||||||
9.
|
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
| |||||||||
10.
|
A _______ is hardware and/or software that protects a network s resources from intrusion by users on another network such as the Internet.
| |||||||||
11.
|
Which of the following is not a possessed object?
| |||||||||
COGNITIVE ASSESSMENT
| ||||||||||
12.
|
The term CAPTCHA is _____________.
| |||||||||
13.
|
Which of the following statements is not true about biometric devices?
| |||||||||
14.
|
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
| |||||||||
15.
|
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
| |||||||||
16.
|
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
| |||||||||
17.
|
Which of the following statements is not true about intellectual property rights?
| |||||||||
18.
|
Which of the following terms is used to describe a small text file that a web server stores on your computer?
| |||||||||
19.
|
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
| |||||||||
20.
|
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
| |||||||||
Thursday, 9 July 2015
computer concept
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment