Exam 7: Computer and Network Security
Exam 1: Catalysts for Change45 Questions
Exam 2: Introduction to Ethics27 Questions
Exam 3: Networked Communications26 Questions
Exam 4: Intellectual Property21 Questions
Exam 5: Information Privacy15 Questions
Exam 6: Privacy and the Government23 Questions
Exam 7: Computer and Network Security11 Questions
Exam 8: Computer Reliability17 Questions
Exam 9: Professional Ethics9 Questions
Exam 10: Work and Wealth16 Questions
Select questions type
What happened when the FBI asked Apple to create a new version of the iOS operating system was would allow the FBI to gain access to the locked iPhone of Syed Rizwan Farook?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
D
A program with a benign capability that conceals another, sinister purpose is called a
(Multiple Choice)
4.8/5
(35)
A self-contained program that spreads through a computer network by exploiting security holes is called a
(Multiple Choice)
4.7/5
(35)
Manipulating someone within an organization to gain access to confidential information is called
(Multiple Choice)
4.8/5
(36)
A software program that responds to commands sent by a command-and-control program located on an external computer is called a
(Multiple Choice)
4.9/5
(47)
An intentional action designed to prevent legitimate users from making use of a computer service over the Internet is called
(Multiple Choice)
4.8/5
(36)
The Social Security numbers and other personal information from 22 million Americans were stolen by hackers from computers managed by the Office of Personnel Management, and the prime suspect was a group of hackers located in
(Multiple Choice)
4.8/5
(41)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)