Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
CMPTR
Quiz 6: Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____.
Question 22
Multiple Choice
Tracy defaced her school's Web site and posted some irrelevant information on it. This is an example of _____.
Question 23
Multiple Choice
_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers.
Question 24
Multiple Choice
A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.
Question 25
Multiple Choice
A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.
Question 26
Multiple Choice
Two of the most common ways individuals are harassed online are cyberbullying and _____.
Question 27
Multiple Choice
Leslie, a computer hacker, creates a game using malware code for desktop computers. Once users download the game, the malware infects their devices without their knowledge. The type of malware Leslie has programmed into the game is a _____.
Question 28
Multiple Choice
The accompanying figure shows the working of a _____.
Question 29
Multiple Choice
Abby writes a program that redirects users trying to visit a Web site to a bogus Web site created by him. The scam Abby has committed is called _____.
Question 30
Multiple Choice
_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.
Question 31
Multiple Choice
A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.