There are no comments, be the first and leave one below:
What does a disk cleanup utility do?
Creates and index of files on the files on the disk
searches for and removes unnecessary files
Organizes files into consecutive sectors
Provides file management capabilities
The term, PIN is an acronym for which of the following
private internet notification
possessed information number
possessed information network
Personal identification number
Which of the following terms is used to describe a program that copies itself repeatedly , using up resources and possibly shutting down the computer or network?
a trojan horse
a virus
a worm
a rootkit
Which of the following best describes the term, cybercrime?
any illegal act involving a computer
Online or internet-based illegal acts
a type of gaming software that stimulates criminal acts
using the internet to apprehend and prosecute criminals
Computer viruses, worms, trojan horses, and rootkits are classified as which of the following?
threats
malware
cybermalls
untrusted sources
Which of the following is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
spoofing
rebuking
transmitting
victimizing
The term zombie is?
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
a program that performs a repetitive task on a network
a group of compromised computers connected to a network that attacks other networks
spam sent via email to spread viruses or commit a distribute denial of service attack
The term back door, as it refers to computer crime is?
the area of the memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attack in the future
the vulnerabilities of a computer criminal network that enables them to be tracked and caught
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or netweork
a weakness in a computer or network's security system that enables criminals to gain unauthorized access
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
They restore the files
The index the files
They reset the files
They resource the files
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
In order to safeguard your personal information, which of the following is recommended?
Use shopping club and buying cards when shopping to remain anonymous
Clear your history file when you are finished browsing
Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them
Preprint your telephone number on your personal checks so business can reach you quickly if they determine a problem with your purchase.
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
information privacy
data rights
acceptable use
social restrictions
Which of the following terms refers to someone who uses the internet or network to destroy or damage computers for political reasons?
script kiddie
cyberterrorist
cracker
cyberextortionist
What is the term for a website that uses encryption techniques to protect its data?
secure site
vault
Locked site
Virtual site
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost damaged, or destroyed?
bot
restored file
backup
IP file
Which of the following is a small test file that a web server stores on a users computer
cookie
spike
payload
worm
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
secure key
PIN
password
passterm
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a users personal and financial information?
spam
phishing
spit
spyware
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?
distribute
network
site
multipurpose
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
Cyberextortionist
Cyberterrorist
With which of the following do users choose which folders and files to include in a backup?
incremental backup
full backup
selective backup
Differential backup
The term firewall is
a virus that prevents the computer or network from accessing outside resources
a program that searches for cybercriminals by looking for patterns in attacks
hardware and/or software that protects a network's resources from intrusion
the access point a hacker uses to intrude on a computer or network
Which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure
hacker
Internet adverting firms often use which of the following to collect information about users web browsing habits?
postware
billware
comware
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
information liability
network compromise
technical terrorism
digital security risk
Which term is used to describe software used by cybercriminals?
Crimeware
criminalware
cyberware
conware