Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Last Answer : a. firewall
Description : A non-skilled person who gains access to computer system using already made tools are known as? a. Grey hat hackers b. Hacktivist c. Script kiddies d. Phreakers
Last Answer : c. Script kiddies
Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers
Last Answer : d) Whistle Blowers
Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies
Last Answer : A. Disgruntled employees
Last Answer : D. Script kiddies
Description : ) which type of hackers represent the highest risk to your network (a) black hat hackers (b) grey hat hackers (c) disgruntled employees (d) script kiddies
Last Answer : (c) disgruntled employees
Last Answer : c) Script Kiddies
Description : Which type of hacker represents the highest risk to your network? ∙ A. Disgruntled employees ∙ B. Black-hat hackers ∙ C. Grey-hat hackers ∙ D. Script kiddies
Description : Which type of products is lesser purchased using ecommerce? a. automobiles b. books c. softwares d. none
Last Answer : a. automobiles
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : c. Reliability
Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : b. Accessibility
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability
Last Answer : d. Interoperability
Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies
Last Answer : c) Firewall
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : Banner grabbing is often used for……. a. White hat hacking b. Black hat hacking c. Gray hat hacking d. Script kiddies
Last Answer : a. White hat hacking
Description : banner grabbing is often use for (a) white hat hacking (b) black hat hacking (c) gray hat hacking (d) script kiddies
Last Answer : (a) white hat hacking
Description : Banner grabbing is used for A. White Hat Hacking B. Black Hat Hacking C. Grey Hat Hacking D. Script Kiddies
Last Answer : A. White Hat Hacking
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : Which is not a component of ERP? a. Legacy systems b. Bolt on applications c. Operational database d. Cybersoft
Last Answer : d. Cybersoft
Description : Which factor represents a system's ability to change quickly? a. Flexibility b. Performance c. Capacity planning d. Benchmark
Last Answer : a. Flexibility
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Last Answer : d. None of the above
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers
Last Answer : e) break into other people's computers
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above
Last Answer : d. All of the above
Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above
Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing
Last Answer : b. Ask people to fill out and return a fake letter using postal mail
Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : b. Packet sniffer
Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy
Last Answer : d. All of the above are dimensions of privacy
Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers
Last Answer : b. People
Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services
Last Answer : d. Web services
Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system
Last Answer : d. Messaging‐based workflow system
Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : d. Disaster recovery cost curve
Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : a. Disaster recovery plan
Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above
Last Answer : d. all of the above
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : What is a technology‐enabled microchip implanted into the human body? a. Wearable computer b. GPS c. Implant chip d. None of the above
Last Answer : c. Implant chip
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. a. Threat b. Danger c. Error d. None of the above
Last Answer : a. Threat
Description : What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt? a. Wearable computer b. GPS c. Implant chip d. None of the above
Last Answer : a. Wearable computer
Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware
Last Answer : a. Key logger software
Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above