Exam 17: Computer Crime and Digital Forensics
Exam 1: The Information Age in Which You Live: Changing the Face of Business140 Questions
Exam 2: Major Business Initiatives: Gaining Competitive Advantage With It121 Questions
Exam 3: Databases and Data Warehouses: Supporting the Analytics-Driven Organization120 Questions
Exam 4: Analytics, Decision Support, and Artificial Intelligence: Brain-Power for Your Business124 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy128 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques138 Questions
Exam 7: Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise125 Questions
Exam 8: Protecting People and Information: Threats and Safeguards126 Questions
Exam 9: Emerging Trends and Technologies: Business, People, and Technology Tomorrow120 Questions
Exam 10: Computer Hardware and Software125 Questions
Exam 11: The World Wide Web and the Internet125 Questions
Exam 12: Designing Databases and Entity-Relationship Diagramming100 Questions
Exam 13: Decision Analysis With Spreadsheet Software117 Questions
Exam 14: Network Basics125 Questions
Exam 15: Building a Web Page With Html110 Questions
Exam 16: Object-Oriented Technologies112 Questions
Exam 17: Computer Crime and Digital Forensics125 Questions
Exam 18: Building an E-Portfolio137 Questions
Exam 19: Implementing a Database With Microsoft Access129 Questions
Exam 20: Careers in Business132 Questions
Exam 21: Building Web Sites With Front-page125 Questions
Exam 22: Programming in Excel With VBA125 Questions
Select questions type
In a live analysis,the examiner makes a forensic image of the disk.
(True/False)
4.9/5
(30)
_____ space refers to the space left over at the end of a file to the end of the cluster.
(Multiple Choice)
4.7/5
(38)
A Trojan horse is a type of _____ that does not replicate itself.
(Short Answer)
4.9/5
(42)
Which law requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity?
(Multiple Choice)
4.8/5
(29)
Microsoft Office lets a person protect files in a way that when someone tries to open a file,a pop-up window asks the person for a ____.
(Short Answer)
5.0/5
(39)
Sally does most of her bank transactions online.Recently,while trying to access her bank details online,she realized that her password was no longer valid.On inquiring with the bank authorities,she found that somebody had fraudulently transacted using her login details and had transferred all her money to an unknown account.Sally was a victim of _____ where cyber criminals were tracking her every mouse click to steal her bank details.
(Multiple Choice)
4.9/5
(38)
A _____ is software that gives a person administrator rights to a computer or network and its purpose is to allow the person to conceal processes,files,or system data from the operating system.
(Short Answer)
4.9/5
(35)
Which of the following is a difference between cyber war and hacktivism?
(Multiple Choice)
4.8/5
(33)
It takes a long time for password cracking programs to find passwords.
(True/False)
4.8/5
(29)
Which of the following options can make one delete a file so that the file is not listed in the Recycle Bin?
(Multiple Choice)
4.9/5
(36)
_____ space refers to the set of clusters that have been marked as available to store information,but have not yet received a file.
(Multiple Choice)
4.8/5
(30)
Which of the following should be undertaken when one receives a viral hoax?
(Multiple Choice)
4.8/5
(31)
The early computer viruses depended on people exchanging infected storage media like disks.
(True/False)
4.9/5
(35)
Computers are involved in two ways in the commission of crime,i.e. ,as targets and as weapons or tools.
(True/False)
4.8/5
(41)
Flash memory is divided into the traditional blocks of bytes instead of in pages of 2 KB or 4 KB.
(True/False)
4.7/5
(37)
The difference between cyber war and hacktivism is that hacktivism is better-funded.
(True/False)
4.7/5
(32)
The Stuxnet worm was transported from computer to computer using a _____ and was designed to attack Iran's nuclear fuel enrichment centrifuges.
(Short Answer)
4.8/5
(38)
Showing 41 - 60 of 125
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)