Exam 17: Computer Crime and Digital Forensics
Exam 1: The Information Age in Which You Live: Changing the Face of Business140 Questions
Exam 2: Major Business Initiatives: Gaining Competitive Advantage With It121 Questions
Exam 3: Databases and Data Warehouses: Supporting the Analytics-Driven Organization120 Questions
Exam 4: Analytics, Decision Support, and Artificial Intelligence: Brain-Power for Your Business124 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy128 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques138 Questions
Exam 7: Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise125 Questions
Exam 8: Protecting People and Information: Threats and Safeguards126 Questions
Exam 9: Emerging Trends and Technologies: Business, People, and Technology Tomorrow120 Questions
Exam 10: Computer Hardware and Software125 Questions
Exam 11: The World Wide Web and the Internet125 Questions
Exam 12: Designing Databases and Entity-Relationship Diagramming100 Questions
Exam 13: Decision Analysis With Spreadsheet Software117 Questions
Exam 14: Network Basics125 Questions
Exam 15: Building a Web Page With Html110 Questions
Exam 16: Object-Oriented Technologies112 Questions
Exam 17: Computer Crime and Digital Forensics125 Questions
Exam 18: Building an E-Portfolio137 Questions
Exam 19: Implementing a Database With Microsoft Access129 Questions
Exam 20: Careers in Business132 Questions
Exam 21: Building Web Sites With Front-page125 Questions
Exam 22: Programming in Excel With VBA125 Questions
Select questions type
Which of the following refers to an e-mail sent out intending to frighten people about a virus threat that,in fact,does not exist?
(Multiple Choice)
4.8/5
(31)
Thrill-seeker hackers break into computer systems for entertainment.
(True/False)
4.9/5
(39)
A dollar bill has a watermark image which is hidden inside the other markings on the bill.This process of hiding information is known as ____.
(Short Answer)
4.8/5
(27)
_____ is a hardware/software combination tool which is a USB flash drive that stores,launches,and runs software on any computer.
(Short Answer)
4.8/5
(31)
One of the new problems facing digital forensics experts is the problem of access to cloud computing data.
(True/False)
4.9/5
(33)
_____ denial-of-service attacks are from multiple computers that flood a server or network with so many requests for service that it slows down or crashes.
(Short Answer)
4.7/5
(27)
The process of scrambling the contents of a file so that one cannot read it without the right decryption key is known as ____.
(Multiple Choice)
4.8/5
(26)
_____ are people who would like to be hackers,but because of very little technical expertise,they download click-and-point software that automatically does the hacking for them.
(Short Answer)
4.9/5
(39)
Which of the following was the most the most common type of computer worm during 2007 and 2008?
(Multiple Choice)
4.8/5
(41)
An interesting feature of the _____ worm was that it downloaded the latest version of itself when it entered a computer connected to the Internet and secretly recorded the normal readings and played those back while it did its other work.
(Multiple Choice)
4.8/5
(31)
Which of the following refers to politically motivated hackers who use the Internet to send a political message of some kind?
(Multiple Choice)
4.7/5
(35)
Key logger software is a program that,when installed on a computer,records every _____ and ____.
(Short Answer)
4.8/5
(40)
_____ software is a program used to snoop on people to find out what they are doing on a particular computer by recording every mouse click and keystroke.
(Multiple Choice)
4.7/5
(40)
Solid-state hard drives (SSDs)are based on _____ memory and do not function in the same way as magnetic hard drives.
(Short Answer)
4.9/5
(26)
The process of blacking out portions of a document,usually to protect confidential information,so that it cannot be recovered later is known as ____.
(Multiple Choice)
4.8/5
(42)
The _____ option helps a person rearrange data on one's hard disk and overwrite deleted files.
(Short Answer)
4.9/5
(34)
_____ are politically motivated and seek to cause harm to people or destroy critical systems or information.
(Multiple Choice)
4.7/5
(44)
A difference between the Slammer and Stuxnet worm was that the Slammer:
(Multiple Choice)
4.8/5
(34)
Showing 61 - 80 of 125
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)