Exam 7: Computer and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You may find a virus

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

E

The Conficker worm is notable because

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

What happened when the FBI asked Apple to create a new version of the iOS operating system was would allow the FBI to gain access to the locked iPhone of Syed Rizwan Farook?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

D

A program with a benign capability that conceals another, sinister purpose is called a

(Multiple Choice)
4.8/5
(35)

A self-contained program that spreads through a computer network by exploiting security holes is called a

(Multiple Choice)
4.7/5
(35)

Manipulating someone within an organization to gain access to confidential information is called

(Multiple Choice)
4.8/5
(36)

Anonymous is

(Multiple Choice)
4.8/5
(33)

A software program that responds to commands sent by a command-and-control program located on an external computer is called a

(Multiple Choice)
4.9/5
(47)

The Internet worm was released by

(Multiple Choice)
4.9/5
(28)

An intentional action designed to prevent legitimate users from making use of a computer service over the Internet is called

(Multiple Choice)
4.8/5
(36)

The Social Security numbers and other personal information from 22 million Americans were stolen by hackers from computers managed by the Office of Personnel Management, and the prime suspect was a group of hackers located in

(Multiple Choice)
4.8/5
(41)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)