Multiple ChoiceIdentify the choice that best completes the statement or answers the question. 1.Which of the following is any event or action that could cause a loss of or damage to computer hardware software data information or processing capability?a.digital security riskc.technical terrorismb.information liabilityd.network compromise 2.Which of the following has the same intent as a cracker but does not have the technical skills and knowledge?a.hackerc.cyberextortionistb.script kiddied.cyberterrorist 3.Computer viruses worms Trojan horses and rootkits are classified as which of the following?a.malwarec.threatsb.untrusted sourcesd.cybermalls 4.What is the term for a program that performs a repetitive task on a network?a.zombiec.botb.rootkitd.Trojan horse 5.In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?a.distributedc.limitedb.delayedd.staggered 6.A ________ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program computer or network.a.Trojan horsec.Zombieb.Back doord.Botnet 7.Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?a.rebukingc.transmittingb.spoofingd.victimizing 8.Which of the following is a federally funded Internet security research and development center?a.W3Cc.CERT/CCb.NSFd.Internet2 9.Which of the following are used to record save an then execute a set of keystrokes and instructions repeatedly?a.keygensc.backdoorsb.indicesd.macros 10.A _______ is hardware and/or software that protects a network s resources from intrusion by users on another network such as the Internet.a.Great wallc.Firewallb.Back doord.Botnet 11.Which of the following is not a possessed object?a.PINc.smart cardb.badged.keyCOGNITIVE ASSESSMENT 12.The term CAPTCHA is _____________.a.a private combination of words associated with a user name that allows access to computer resourcesb.the average time it takes a computer to discover a password based on the number of charactersc.a digital image used to help decipher a faded or blurry word in digitized news archivesd.a series of distorted characters that a user is required to enter correctly to continue using a website 13.Which of the following statements is not true about biometric devices?a.Personal characteristics are unique and cannot be forgotten or misplaced.b.Biometric devices are an unreliable method of identification and notification.c.Examples include fingerprint readers and hand geometry systems.d.Biometric devices translate a personal characteristic into a digital code. 14.What term is used to describe the discovery collection and analysis of evidence found on computers and networks?a.cybersleuthingc.system analysisb.digital forensicsd.data mining 15.In your encryption algorithm you swapped adjacent characters. Which algorithm did you use?a.substitutionc.expansionb.transpositiond.compaction 16.Which of the following terms is used to describe an encrypted code that a person website or organization uses to verify the identity of the message sender?a.a certificate authorityc.an encryption keyb.a digital signatured.a hash 17.Which of the following statements is not true about intellectual property rights?a.The term fair use refers to the rights which creators are entitled for their work.b.Intellectual property refers to unique and original works such as ideas inventions company logos and more.c.A copyright protects any tangible form of expression.d.Digital rights management is a strategy designed to prevent illegal distribution of digital content. 18.Which of the following terms is used to describe a small text file that a web server stores on your computer?a.a breadcrumbc.a crackerb.a nuggetd.a cookie 19.Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?a.CAN-SPAM Actc.COPPAb.Computer Abuse Amendments Actd.Electronic Communication Privacy Act 20.Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?a.Electronic Communications Privacy Act (ECPA)b.Fair Credit Reporting Actc.Computer Fraud and Abuse Actd.Computer Matching and Privacy Protection Ac

Categories: Uncategorized


Leave a Reply

Your email address will not be published. Required fields are marked *