Chapter 9 CC Review Practice Exam Questions.
Chapter 9 CC Review Practice Exam Questions. This type of computer criminal creates and distributes malicious programs. - CORRECT ANSWER cracker t/f The essential element that controls how computers are used is a law. - CORRECT ANSWER false Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return? - CORRECT ANSWER INternet scam The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person. - CORRECT ANSWER cyberbullying t/f Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites - CORRECT ANSWER true Free computer games and free screen saver programs are typical carriers of _______ - CORRECT ANSWER Trojan horses This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. - CORRECT ANSWER Rogue According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away? - CORRECT ANSWER Digital Millennium Copyright Act Which of the following is not malware? - CORRECT ANSWER Ad-Aware A program that replicates itself and clogs computers and networks. - CORRECT ANSWER Worm Small data files that are deposited on a user's hard disk when they visit a website are called _______ - CORRECT ANSWER cookies t/f Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. - CORRECT ANSWER true t/f Most browsers offer a privacy mode that ensures that your browsing activity is not recorded on your hard disk. - CORRECT ANSWER true t/f It is highly likely that each one of us has an electronic profile created by information resellers. - CORRECT ANSWER true t/f Identity theft and mistaken identity are the same - CORRECT ANSWER false Which of the following is the most widely used wireless network encryption for home wireless networks? - CORRECT ANSWER WPA2 t/f If copyright-protected music is uploaded to a website, it is legal to download it - CORRECT ANSWER fasle
Written for
Document information
- Uploaded on
- June 25, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- ccs
-
chapter 9 cc review practice exam questions