BCIS 1405 Exam| Questions with 100% Solutions| Verified| Latest Update
1 view 0 purchase
Course
BCIS 1405
Institution
BCIS 1405
An ____ use policy requires a user to agree to follow it to be provided access to corporate
email, info, systems and the internet. - Ans Acceptable
1. Elevation of Privileges
2. Hoaxes
3. Malicious Code
4. Packet Tampering
5. Sniffer
6. Spoofing
,- a program or device that can monitor data traveling over a network.
- software that comes hidden in free downloadable software and tracks online movements.
- a process by which a user misleads a system into granting unauthorized rights, usually for the
purpose of compromising or destroying the system.
- fake blogs created solely to raise the search engine rank of affiliated websites.
- consists of altering the contents of packets as they travel over the internet or altering data
on computer disks after penetrating a network.
- the forging of the return address on an email so that the message appears to come
from someone other than the actual sender.
- Includes a variety of threats such as viruses, worms and trojan horses.
- attack computer systems by transmitting a virus hoax with a r - Ans 5. a program or
device that can monitor data traveling over a network.
8. software that comes hidden in free downloadable software and tracks online movements.
1. a process by which a user misleads a system into granting unauthorized rights, usually for
the purpose of compromising or destroying the system.
7. fake blogs created solely to raise the search engine rank of affiliated websites.
4. consists of altering the contents of packets as they travel over the internet or altering data
on computer disks after penetrating a network.
6. the forging of the return address on an email so that the message appears to come from
someone other than the actual sender.
3. Includes a variety of threats such as viruses, worms and trojan horses.
2. attack computer systems by transmitting a virus hoax with a real virus hoax, with a real
virus attached.
Info ____ is the category of computer security that addresses the protection of data from
unauthorized and confirmation of data authenticity. - Ans Secrecy
What is the electronic defacing of an existing website?
,-Typosquatting
- Website name stealing
-Internet Censorship
-Cybervandalism - Ans -Cybervandalism
_____ is a form of malicious software that infects your computer and asks for money. - Ans
Ransomware
What is a technological solution that allows publishers to control their digital media
to discourage, limit, or prevent illegal copying and distribution?
- -Counterfeit software
- Intellectual property
- Digital rights management
- Pirated software - Ans - Digital rights management
What is computer crime where a competitior or disgruntled employee increases a
company's search advertising costs by repeatedly clicking on the advertiser's link?
Info ____ is the act of conforming, acquiescing or yielding information. - Ans Compliance
Two statements relating to ethical computer use policy.
- users need to create the rules
, - users need to accept the rules
- users need to be informed of the rules
- users need to consent to following the rules. - Ans - users need to be informed of the rules
- users need to consent to following the rules.
What uses their social skills to trick people into revealing access credentials or other
valuable information?
- hackers and viruses
- social security policies
- social engineering
- sniffers and spoofing - Ans - social engineering
_____ is a program that secretly takes over another computer for the purpose of launching
attacks on other computers. - Ans Zombie
- attacks from multiple computers that flood a website with so many requests for service that
it slows down or crashes.
- Spread itself, not only from file to file, but also from computer to computer
- Hides inside other software, usually as an attachment or downloadable file
- opens a way into the network for future attacks.
- floods a website with so many requests that is slows down or crashes the file.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.