Exam 7: Computer and Network Security
Exam 1: Catalysts for Change42 Questions
Exam 2: Introduction to Ethics27 Questions
Exam 3: Networked Communications16 Questions
Exam 4: Intellectual Property20 Questions
Exam 5: Information Privacy13 Questions
Exam 6: Privacy and the Government19 Questions
Exam 7: Computer and Network Security12 Questions
Exam 8: Computer Reliability15 Questions
Exam 9: Professional Ethics9 Questions
Exam 10: Work and Wealth16 Questions
Select questions type
The process of determining that a user has permission to perform a particular action on a computer is called
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
An intentional action designed to prevent legitimate users from making use of a computer service is called
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
C
A software program that responds to commands sent by a command-and-control program located on an external computer is called a
(Multiple Choice)
4.9/5
(43)
Manipulating someone within an organization to gain access to confidential information is called
(Multiple Choice)
4.9/5
(41)
A program with a benign capability that conceals another, sinister purpose is called a
(Multiple Choice)
4.9/5
(44)
A self-contained program that spreads through a computer network by exploiting security holes is called a
(Multiple Choice)
4.8/5
(31)
Determining that a person is who he or she claims to be on a computer is called
(Multiple Choice)
4.8/5
(31)
A piece of self-replicating code embedded within another program is called a
(Multiple Choice)
4.9/5
(27)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)