SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 314 Weeks Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 28 Nov 2017 My Price 8.00

pretends to be your banking institution in order to convince

If someone pretends to be your banking institution in order to convince you to tell them your password information, this is called

Spoofing

Identity theft

Spooling

Hacking

 

Flag this Question

Question 25 pts

Which of the following can help reduce the frequency of denial-of-service attacks on a computer network?

all of these

a firewall

anti-virus software

a DMZ network

 

Flag this Question

Question 35 pts

TOR is software that allows users to browse the web ________.

anonymously

openly

behind a firewall

with an encrypted password

 

Flag this Question

Question 45 pts

Anti-malware software can protect a user's computer from which of the following?

trojan horses

bootkits

spareware

slugs

 

Flag this Question

Question 55 pts

This uses software to try thousands of common words sequentially in an attempt to guess a user's password.

Firewall

Encryption

War dialer

Dictionary attack

 

Flag this Question

Question 65 pts

Using deception to get individuals to reveal sensetive information is called:

Spamming

Engineered sociology

Social engineering

Identity theft

 

Flag this Question

Question 75 pts

To avoid being hacked, email accounts should have passcodes with:

at least 8 characters with a combination of upper/lowercase letters and symbols

the user's Social Security number

at least 40 characters with the user's first and last name included

no more than 8 characters with only punctuation symbols

 

Flag this Question

Question 85 pts

Which of the following occur when a computer or network is flooded with an overflow of connection requests at once?

denial-of-service attack

HTTP request time out

traceroute

keylogging

 

Flag this Question

Question 95 pts

_____ is a standalone, self-replicating, malicious program designed to spread to other computers

Computer worm

Nagware

Ransomware

Trojan horse

 

Flag this Question

Question 105 pts

In addition to providing a computer with short-term power when the main power source fails, what else can an uninterruptable power supply protect against?

voltage spikes

inharmonic distortion

denial-of-service attack

segmentation faults

 

Flag this Question

Question 115 pts

The name for harassment on the Internet is:

Cyberstealing

Cyberography

Cyberjacking

Cyberstalking

 

Flag this Question

Question 125 pts

Which of the following uses information from the human body to verify identity?

bioinformatic IDs

personal DNA sequencing

biometric IDs

genetic fingerprints

 

Flag this Question

Question 135 pts

If changing profile information on your social network requires both a password and a temporary 3-digit code texted to your mobile device, that system is called:

authentication overkill

a dual-passcode system

multi-factor authentication

signature ID

 

Flag this Question

Question 145 pts

What is the most commonly used tool used to restrict access to a computer system?

passcode identification

biometric identification

signature identification

token identification

 

Flag this Question

Question 155 pts

The majority of computer based thefts are committed by

domestic hackers

teenage computer geniuses

foreign hackers

company employees

 

Flag this Question

Question 165 pts

An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a(n)

Internet worm

Virus

Trojan horse

Time bomb

 

Flag this Question

Question 175 pts

This software gathers information about a person or organization without their knowledge and may send such information to another entity:

Nagware

Spyware

Ransomware

a Trojan horse

 

Flag this Question

Question 185 pts

An identity token can authenticate a user by using:

a passphrase

a signature

a biometric key

a portable physical object

Answers

(5)
Status NEW Posted 28 Nov 2017 02:11 PM My Price 8.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)