Question: Phishing: Question 12 options: A con executed using technology, typically targeted at acquiring sensitive information, or tricking someone into installing malicious software. A term that,
Phishing:
Question 12 options:
|
| A con executed using technology, typically targeted at acquiring sensitive information, or tricking someone into installing malicious software. |
|
| A term that, depending upon the context, may be applied to either, 1) someone who breaks into a computer system, or 2) a particularly clever solution. |
|
| When someone uncovers computer weaknesses, without exploiting them. |
|
| When a protester seeks to make a political point by leveraging technology tools, often via system integration, defacement, or damage. |
Which of the following is false?
Question 13 options:
|
| Social engineering attempts to trick or con individuals into providing information. |
|
| Viruses, worms, and Trojan horses are types of infecting software. |
|
| Encryption can render a firm's data assets unreadable, even if copied, or stolen. |
|
| Most users employ efficient and secure password systems. |
Which of the following is true of Netflix and the Internet Service Providers (ISP's)?
Question 14 options:
|
| Netflix gains a competitive advantage by owning and controlling the so-called "last mile" to a consumer's house, and they do so with little competition. |
|
| Bandwidth caps are typically not favored by Internet Service Providers (ISP's). |
|
| Net neutrality is the principle that Internet Service Providers (ISP's) have the right to shut down access, and/or to charge differently by user, content, site, and application. |
|
| Netflix streaming consumes more North American bandwidth traffic than any other service -- i.e., more than YouTube, Amazon, HBO Go, iTunes, and BitTorrent combined. |
CAPTCHAs:
Question 15 options:
|
| A software program that securely captures data from a swipe card's magnetic strip. |
|
| Software that surreptitiously monitors user actions or network traffic, or scans for files. |
|
| Malicious code that scans computing memory for sensitive data. |
|
| An automated test used to discern computers from humans, and vice versa. |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
