Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Managers Study Set 1
Quiz 11: Cybercrime and It Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Which of the following is used to ensure that only humans obtain free email accounts?
Question 22
Multiple Choice
Which of the following best describes spear-phishing?
Question 23
Multiple Choice
Botnet computers are also called _____.
Question 24
Multiple Choice
_____ is the abuse of email systems to send unsolicited email to large numbers of people.
Question 25
Multiple Choice
Identify a true statement about smishing.
Question 26
Multiple Choice
Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks.
Question 27
Multiple Choice
Identify the mode of message transmission used in vishing.
Question 28
Multiple Choice
Identify a true statement about Trojan horses.
Question 29
Multiple Choice
Identify the mode of message transmission used in smishing.
Question 30
Multiple Choice
Which of the following defines a rootkit?
Question 31
Multiple Choice
The _____ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file.
Question 32
Multiple Choice
Jack was shocked to witness the sudden drop in performance of his laptop.He also found that the screen saver constant changed and that the taskbar had disappeared.The given problems are symptoms of _____ infections.