Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) engineering
B) theft
C) pretexting
D) pharming
Correct Answer
verified
Multiple Choice
A) denial of service (DoS)
B) zombie
C) logic bomb
D) rootkit
Correct Answer
verified
Matching
Correct Answer
True/False
Correct Answer
verified
Multiple Choice
A) virus signature
B) encryption code
C) compression code
D) virus pattern
Correct Answer
verified
Multiple Choice
A) worm
B) script virus
C) encryption virus
D) macro virus
Correct Answer
verified
Multiple Choice
A) use your debit card information to purchase items illegally
B) assume your identity
C) steal your logons and passwords for various accounts
D) launch a denial of service (DoS) attack on your computer
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Matching
Correct Answer
True/False
Correct Answer
verified
Multiple Choice
A) cyberloafing
B) cybersleeping
C) cyberlazing
D) cyberbreaking
Correct Answer
verified
Multiple Choice
A) identity theft
B) non-auction scam
C) advance fee fraud
D) malware fraud
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) FBI and the IRS
B) FBI and the CIA
C) FBI and National White Collar Crime Center
D) NRA and the U.S. Department of Defense
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) Adware
B) Ghostware
C) Shareware
D) Spyware
Correct Answer
verified
Showing 41 - 60 of 76
Related Exams