The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 314 Weeks Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
If someone pretends to be your banking institution in order to convince you to tell them your password information, this is called
Spoofing
Identity theft
Spooling
Hacking
Â
Flag this Question
Question 25Â pts
Which of the following can help reduce the frequency of denial-of-service attacks on a computer network?
all of these
a firewall
anti-virus software
a DMZ network
Â
Flag this Question
Question 35Â pts
TOR is software that allows users to browse the web ________.
anonymously
openly
behind a firewall
with an encrypted password
Â
Flag this Question
Question 45Â pts
Anti-malware software can protect a user's computer from which of the following?
trojan horses
bootkits
spareware
slugs
Â
Flag this Question
Question 55Â pts
This uses software to try thousands of common words sequentially in an attempt to guess a user's password.
Firewall
Encryption
War dialer
Dictionary attack
Â
Flag this Question
Question 65Â pts
Using deception to get individuals to reveal sensetive information is called:
Spamming
Engineered sociology
Social engineering
Identity theft
Â
Flag this Question
Question 75Â pts
To avoid being hacked, email accounts should have passcodes with:
at least 8 characters with a combination of upper/lowercase letters and symbols
the user's Social Security number
at least 40 characters with the user's first and last name included
no more than 8 characters with only punctuation symbols
Â
Flag this Question
Question 85Â pts
Which of the following occur when a computer or network is flooded with an overflow of connection requests at once?
denial-of-service attack
HTTP request time out
traceroute
keylogging
Â
Flag this Question
Question 95Â pts
_____ is a standalone, self-replicating, malicious program designed to spread to other computers
Computer worm
Nagware
Ransomware
Trojan horse
Â
Flag this Question
Question 105Â pts
In addition to providing a computer with short-term power when the main power source fails, what else can an uninterruptable power supply protect against?
voltage spikes
inharmonic distortion
denial-of-service attack
segmentation faults
Â
Flag this Question
Question 115Â pts
The name for harassment on the Internet is:
Cyberstealing
Cyberography
Cyberjacking
Cyberstalking
Â
Flag this Question
Question 125Â pts
Which of the following uses information from the human body to verify identity?
bioinformatic IDs
personal DNA sequencing
biometric IDs
genetic fingerprints
Â
Flag this Question
Question 135Â pts
If changing profile information on your social network requires both a password and a temporary 3-digit code texted to your mobile device, that system is called:
authentication overkill
a dual-passcode system
multi-factor authentication
signature ID
Â
Flag this Question
Question 145Â pts
What is the most commonly used tool used to restrict access to a computer system?
passcode identification
biometric identification
signature identification
token identification
Â
Flag this Question
Question 155Â pts
The majority of computer based thefts are committed by
domestic hackers
teenage computer geniuses
foreign hackers
company employees
Â
Flag this Question
Question 165Â pts
An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a(n)
Internet worm
Virus
Trojan horse
Time bomb
Â
Flag this Question
Question 175Â pts
This software gathers information about a person or organization without their knowledge and may send such information to another entity:
Nagware
Spyware
Ransomware
a Trojan horse
Â
Flag this Question
Question 185Â pts
An identity token can authenticate a user by using:
a passphrase
a signature
a biometric key
a portable physical object
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly