100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
BCIS 1405 Exam| Questions with 100% Solutions| Verified| Latest Update $13.49   Add to cart

Exam (elaborations)

BCIS 1405 Exam| Questions with 100% Solutions| Verified| Latest Update

 1 view  0 purchase
  • Course
  • BCIS 1405
  • Institution
  • BCIS 1405

An ____ use policy requires a user to agree to follow it to be provided access to corporate email, info, systems and the internet. - Ans Acceptable 1. Elevation of Privileges 2. Hoaxes 3. Malicious Code 4. Packet Tampering 5. Sniffer 6. Spoofing

Preview 4 out of 33  pages

  • August 29, 2024
  • 33
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • BCIS 1405
  • BCIS 1405
avatar-seller
KenAli
BCIS 1405 Exam| Questions with 100%
Solutions| Verified| Latest Update

An ____ use policy requires a user to agree to follow it to be provided access to corporate
email, info, systems and the internet. - Ans Acceptable


1. Elevation of Privileges
2. Hoaxes
3. Malicious Code
4. Packet Tampering
5. Sniffer
6. Spoofing
7. Splogs (spam blogs)
8. Spyware

,- a program or device that can monitor data traveling over a network.
- software that comes hidden in free downloadable software and tracks online movements.

- a process by which a user misleads a system into granting unauthorized rights, usually for the
purpose of compromising or destroying the system.
- fake blogs created solely to raise the search engine rank of affiliated websites.

- consists of altering the contents of packets as they travel over the internet or altering data
on computer disks after penetrating a network.

- the forging of the return address on an email so that the message appears to come
from someone other than the actual sender.
- Includes a variety of threats such as viruses, worms and trojan horses.

- attack computer systems by transmitting a virus hoax with a r - Ans 5. a program or
device that can monitor data traveling over a network.
8. software that comes hidden in free downloadable software and tracks online movements.

1. a process by which a user misleads a system into granting unauthorized rights, usually for
the purpose of compromising or destroying the system.
7. fake blogs created solely to raise the search engine rank of affiliated websites.

4. consists of altering the contents of packets as they travel over the internet or altering data
on computer disks after penetrating a network.

6. the forging of the return address on an email so that the message appears to come from
someone other than the actual sender.
3. Includes a variety of threats such as viruses, worms and trojan horses.

2. attack computer systems by transmitting a virus hoax with a real virus hoax, with a real
virus attached.


Info ____ is the category of computer security that addresses the protection of data from
unauthorized and confirmation of data authenticity. - Ans Secrecy


What is the electronic defacing of an existing website?

,-Typosquatting

- Website name stealing
-Internet Censorship
-Cybervandalism - Ans -Cybervandalism


_____ is a form of malicious software that infects your computer and asks for money. - Ans
Ransomware



What is a technological solution that allows publishers to control their digital media
to discourage, limit, or prevent illegal copying and distribution?


- -Counterfeit software
- Intellectual property
- Digital rights management
- Pirated software - Ans - Digital rights management



What is computer crime where a competitior or disgruntled employee increases a
company's search advertising costs by repeatedly clicking on the advertiser's link?


- Competitive click-fraud
- Click- fraud
- Child Online Protection Act - Ans - Competitive click-fraud


Info ____ is the act of conforming, acquiescing or yielding information. - Ans Compliance


Two statements relating to ethical computer use policy.


- users need to create the rules

, - users need to accept the rules
- users need to be informed of the rules
- users need to consent to following the rules. - Ans - users need to be informed of the rules
- users need to consent to following the rules.



What uses their social skills to trick people into revealing access credentials or other
valuable information?
- hackers and viruses
- social security policies
- social engineering
- sniffers and spoofing - Ans - social engineering


_____ is a program that secretly takes over another computer for the purpose of launching
attacks on other computers. - Ans Zombie


1. Backdoor
2. Worm
3. Trojan-horse virus
4. Distributed denial-of-service attack (DDoS)
5. Polymorphic Values
6. Denial-of-service act



- attacks from multiple computers that flood a website with so many requests for service that
it slows down or crashes.
- Spread itself, not only from file to file, but also from computer to computer
- Hides inside other software, usually as an attachment or downloadable file
- opens a way into the network for future attacks.

- floods a website with so many requests that is slows down or crashes the file.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85169 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart