Correct Answer
Answered by ExamLex AI
View Answer
Multiple Choice
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Correct Answer
verified
Multiple Choice
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Correct Answer
verified
Multiple Choice
A) Keyloggers
B) Trojans
C) Rootkits
D) Honey pots
Correct Answer
verified
Multiple Choice
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Correct Answer
verified
Multiple Choice
A) Web sites containing pornography
B) an Al Qaeda training manual
C) online auction sites containing Nazi materials
D) a Web site containing instructions for making bombs
Correct Answer
verified
Multiple Choice
A) Honey pots
B) Digital surveillance
C) Computer entrapment
D) Hacker crackdown
Correct Answer
verified
Short Answer
Correct Answer
Answered by ExamLex AI
View Answer
Short Answer
Correct Answer
Answered by ExamLex AI
View Answer
Essay
Correct Answer
Answered by ExamLex AI
View Answer
Multiple Choice
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Correct Answer
verified
Essay
Correct Answer
Answered by ExamLex AI
View Answer
Multiple Choice
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Correct Answer
verified
Multiple Choice
A) an attack in which hackers overload a target site with requests for information.
B) hacking to promote a political cause
C) Web sites that are specifically designed to be attractive to hackers
D) sending millions of emails fishing for information to use to impersonate someone and steal money or goods
E) planting false Internet addresses in the tables on a Domain Name Server (DNS) so that when someone types a URL, they are re-directed to a bogus site
F) biological characteristics that are unique to an individual
G) written defamation
H) verbal defamation
I) a law which covers unauthorized access to computers over which the federal government has jurisdiction, such as government computers, financial systems, medical
J) systems, and activities that involve computers in more than one state
Correct Answer
verified
Essay
Correct Answer
Answered by ExamLex AI
View Answer
Multiple Choice
A) An incompetent programmer who wrote programs that did not work properly
B) A busy programmer who reused code to save time
C) A creative programmer who wrote very elegant or clever programs
D) A new programmer who wrote simple programs
Correct Answer
verified
Short Answer
Correct Answer
Answered by ExamLex AI
View Answer
Showing 1 - 20 of 24
Related Exams