A) Trojan horse.
B) virus.
C) worm.
D) botnet.
Correct Answer
verified
Multiple Choice
A) domestic hackers.
B) company employees.
C) foreign hackers.
D) teenage computer geniuses.
Correct Answer
verified
Multiple Choice
A) malware.
B) spyware.
C) time bomb.
D) macro virus.
Correct Answer
verified
Multiple Choice
A) phishing.
B) a Trojan horse.
C) cracking.
D) computer forensics.
Correct Answer
verified
Multiple Choice
A) hackers.
B) Trojan horses.
C) Webjackers.
D) denial-of-service attackers.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) created as a result of the first headline-making worm
B) declared unconstitutional by the Supreme Court
C) used to arrest a student for writing to crack an Adobe product
D) defines what kinds of communications are legal online
E) created in 2001 as a response to the terrorist attacks of September 11, 2001
F) provides almost instant information on crimes and criminals
Correct Answer
verified
Multiple Choice
A) worm.
B) Trojan horse.
C) virus.
D) botnet.
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The Love Bug
B) Melissa
C) rxbot
D) BubbleBoy
Correct Answer
verified
Multiple Choice
A) UNIX operating systems.
B) Microsoft Word.
C) Microsoft server software.
D) personal computers.
Correct Answer
verified
Multiple Choice
A) email virus.
B) worm.
C) Trojan horse.
D) time bomb.
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cryptography.
B) programming.
C) auditing.
D) decryption.
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Showing 61 - 80 of 84
Related Exams