2023 Multiple Choice Identify the choice that best completes the statement or answers | Assignment Collections

Computer Science 2023 Computer Concept

2023 Multiple Choice Identify the choice that best completes the statement or answers | Assignment Collections

Multiple Choice
Identify the choice that best completes the statement or answers the question.

 

 

 1. 

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

a.

digital security risk

c.

technical terrorism

b.

information liability

d.

network compromise

 

 

 2. 

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

a.

hacker

c.

cyberextortionist

b.

script kiddie

d.

cyberterrorist

 

 

 3. 

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

a.

malware

c.

threats

b.

untrusted sources

d.

cybermalls

 

 

 4. 

What is the term for a program that performs a repetitive task on a network?

a.

zombie

c.

bot

b.

rootkit

d.

Trojan horse

 

 

 5. 

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

a.

distributed

c.

limited

b.

delayed

d.

staggered

 

 

 6. 

A ________ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.

a.

Trojan horse

c.

Zombie

b.

Back door

d.

Botnet

 

 

 7. 

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

a.

rebuking

c.

transmitting

b.

spoofing

d.

victimizing

 

 

 8. 

Which of the following is a federally funded Internet security research and development center?

a.

W3C

c.

CERT/CC

b.

NSF

d.

Internet2

 

 

 9. 

Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

a.

keygens

c.

backdoors

b.

indices

d.

macros

 

 

 10. 

A _______ is hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.

a.

Great wall

c.

Firewall

b.

Back door

d.

Botnet

 

 

 11. 

Which of the following is not a possessed object?

a.

PIN

c.

smart card

b.

badge

d.

key

 

   

 

COGNITIVE ASSESSMENT

 

 

 12. 

The term CAPTCHA is _____________.

a.

a private combination of words associated with a user name that allows access to computer resources

b.

the average time it takes a computer to discover a password based on the number of characters

c.

a digital image used to help decipher a faded or blurry word in digitized news archives

d.

a series of distorted characters that a user is required to enter correctly to continue using a website

 

 

 13. 

Which of the following statements is not true about biometric devices?

a.

Personal characteristics are unique and cannot be forgotten or misplaced.

b.

Biometric devices are an unreliable method of identification and notification.

c.

Examples include fingerprint readers and hand geometry systems.

d.

Biometric devices translate a personal characteristic into a digital code.

 

 

 14. 

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

a.

cybersleuthing

c.

system analysis

b.

digital forensics

d.

data mining

 

 

 15. 

In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?

a.

substitution

c.

expansion

b.

transposition

d.

compaction

 

 

 16. 

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

a.

a certificate authority

c.

an encryption key

b.

a digital signature

d.

a hash

 

 

 17. 

Which of the following statements is not true about intellectual property rights?

a.

The term fair use refers to the rights which creators are entitled for their work.

b.

Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.

c.

A copyright protects any tangible form of expression.

d.

Digital rights management is a strategy designed to prevent illegal distribution of digital content.

 

 

 18. 

Which of the following terms is used to describe a small text file that a web server stores on your computer?

a.

a breadcrumb

c.

a cracker

b.

a nugget

d.

a cookie

 

 

 19. 

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

a.

CAN-SPAM Act

c.

COPPA

b.

Computer Abuse Amendments Act

d.

Electronic Communication Privacy Act

 

 

 20. 

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

a.

Electronic Communications Privacy Act (ECPA)

b.

Fair Credit Reporting Act

c.

Computer Fraud and Abuse Act

d.

Computer Matching and Privacy Protection Ac

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational