100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Comp 110 Chapter 2 Test Exam Questions With Correct Answers A+

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
04-01-2025
Written in
2024/2025

Comp 110 Chapter 2 Test Exam Questions With Correct Answers A+ Which of the following is NOT a threat/risk associated with social media? - AnswerHardware failure Which of the following is NOT a social media website? - AnswerWalM Typical pharming attacks usually target _____. - Answerbanks, financial, and online payment services. DNS cache poisoning changes _____. - Answerthe IP addresses of authentic websites to bogus websites and addresses while maintaining the domain names Social engineers use the same methods as _____, except they use technology. - AnswerCon men Which type of social engineering attack might invol

Show more Read less
Institution
Comp 110
Course
Comp 110








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Comp 110
Course
Comp 110

Document information

Uploaded on
January 4, 2025
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©Jason MacConnell 2025 ALL RIGHTS RESERVED.




Comp 110 Chapter 2 Test Exam Questions
With Correct Answers A+


Which of the following is NOT a threat/risk associated with social media? - Answer✔Hardware
failure
Which of the following is NOT a social media website? - Answer✔WalMart.com

Typical pharming attacks usually target _____. - Answer✔banks, financial, and online payment
services.
DNS cache poisoning changes _____. - Answer✔the IP addresses of authentic websites to bogus
websites and addresses while maintaining the domain names
Social engineers use the same methods as _____, except they use technology. - Answer✔Con
men
Which type of social engineering attack might involve giving away USB drives with malware
loaded on them? - Answer✔Baiting
The internet security threat where zombie computers are used to saturate a server with
unsolicited requests is referred to as _____. - Answer✔Denial-of-service
In the world of internet security, the act of online monitoring for the purpose of intercepting and
exploiting information is referred to as _____. - Answer✔Wi-Fi eavesdropping

Which of the following is NOT a type of cyber crime? - Answer✔Phixing
_____ is the best defense against cyber crime. - Answer✔Prevention

Which country is NOT considered a major cyber threat to the United States? - Answer✔United
Kingdom
Which of these is NOT a reason that information is valuable? - Answer✔Allows access to
infrastructure
What do state laws regarding cybercrime generally pertain to? - Answer✔Trespass to a computer

Which of the following is an example of a cybercrime? - Answer✔Identity theft
Network intrusions
Software piracy

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StarGuide Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
1 year
Number of followers
0
Documents
2591
Last sold
1 week ago
FIRST CLASS GALORE

Accurate Exam Study Materials.Verified And Updated By Professionals.

4.3

4 reviews

5
1
4
3
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions