QUESTION Which of the following is NOT an example of spyware? A) adware B) Trojan horse C) browser hijacker D) key logger E) search hijacker ANSWER Answer: B Explanation: B) Trojan horses are a form of malware, which is malicious software that attacks computer systems. Spyware is software that seeks to harvest confidential information […]
QUESTION Malware that only targets servers will have the LEAST effect on which of the following? A) intranet B) client/server network C) wide area network D) peer-to-peer network E) extranet ANSWER Answer: D Explanation: D) Malware is malicious software that attacks computer systems. Malware that targets network server computers will not affect peer-to-peer networks, […]
QUESTION Janet recently received an e-mail from her bank directing her to visit the online banking website and reset her password. She was dismayed to realize a week later that someone had accessed her account with her new password and withdrew all the money! What is Janet a victim of? A) unsatisfactory cookies B) spam […]
QUESTION What type of network enables communication among employees of a business and specially approved nonemployees via leased lines? A) peer-to-peer network (P2P) B) virtual private network (VPN) C) intranet D) extranet E) local area network (LAN) ANSWER Answer: D Explanation: D) An extranet is a private intranet that connects internal personnel and selected […]
QUESTION Which of the following would cloud computing users NOT expect to be protected against? A) malware B) Trojan horses C) cookies D) worms E) crackers ANSWER Answer: C Explanation: C) Cookies are small text files on a user’s computer that store website information such as login name, password, and preferences. A cookie will […]
QUESTION Frank is logged in to a new RFID system that allows him to track the exact location of his company’s products—whether in the warehouse or on the road for delivery. He can see that one shipment of sheetrock is about two miles from the delivery point. What is Frank reviewing? A) customer preference data […]
QUESTION Ian returned to his Moscow hotel only to discover that his wallet had been pickpocketed on the subway. It’s been gone for hours. While he can replace the traveler’s checks and credit cards, what is Ian most at risk of? A) hackers B) Trojan horses C) identity theft D) spoofing E) pharming ANSWER […]
QUESTION Which of the following lists the elements in correct order from least to most complex? A) data warehouse > data file > business intelligence system > GPS field reports B) GPS field reports > business intelligence system > data file > data warehouse C) GPS field reports > data file > data warehouse > […]
QUESTION Paulina has built a successful business assigning teams to break in to corporate computer systems. Teams then report on the security vulnerabilities that they uncovered and make recommendations to fix them. Which of the following are on Paulina’s staff? A) phishers B) crackers C) pirates D) white hats E) thrill seekers ANSWER Answer: […]
QUESTION Which of the following is considered information that is useful for a business? A) one week of GPS locations for delivery trucks B) one week of sales figures in all coffee store outlets C) incoming and outgoing office e-mail counts for one day D) one month of golf cleat sales figures to customers over […]