Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : d. Biometrics
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : b. recovery
Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above
Last Answer : a. firewall
Description : All of the following are considered biometrics, except: a. Fingerprint b. Retina c. Password d. Voice
Last Answer : c. Password
Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : a. backup
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Last Answer : d. None of the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above
Last Answer : a. Encryption
Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above
Last Answer : d. All of the above
Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Last Answer : d. all the above
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : c. Denial‐of‐service attack
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : What is the name of the new anti‐Spam bill? a. No‐Spam b. CAN‐Spam c. Spam‐Away d. Stop Spam
Last Answer : b. CAN‐Spam
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above
Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services
Last Answer : d. Web services
Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : a. Disaster recovery plan
Description : Copy of data created for safe storage is a) Saved copy b) Backup c) Dcopy d) Stored copy -Technology
Last Answer : Copy of data created for safe storage isBackup
Description : What is the best anti-virus/anti-spyware/anti-hacking & firewall program (free or not free) out there for APPLE MAC?
Last Answer : OSX. There are still 0 confirmed viruses for Macs running OSX. There are a couple Trojans, apparently, but you’d have to go looking for them to find them – and be pretty stupid to actually get infected by them. So, I wouldn’t consider it a problem worth worrying about on a Mac. Enjoy!
Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These
Last Answer : a) Firewall
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above
Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above
Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing
Last Answer : b. Ask people to fill out and return a fake letter using postal mail
Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : b. Packet sniffer
Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy
Last Answer : d. All of the above are dimensions of privacy
Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers
Last Answer : b. People
Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system
Last Answer : d. Messaging‐based workflow system
Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : c. Reliability
Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : b. Accessibility
Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : d. Disaster recovery cost curve
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above
Last Answer : d. all of the above
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : b. Risk assessment
Description : What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? a. Performance b. Capacity planning c. Benchmarking d. Data cleansing
Last Answer : c. Benchmarking
Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA
Last Answer : a. Workflow
Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet
Last Answer : c. Reverse auction
Description : There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1) Testing 2) Backup and recovery 3) Firewall development 4) Design
Last Answer : 3) Firewall development