1. Original forms of data, such as time cards or order forms, are known as ______ documents.
Answer
Correct Answer:
Source.
Note: This Question is unanswered, help us to find answer for this one
2. Closed ports respond to a(n) ____ with an rst packet.
Answer
Correct Answer:
XMAS scan
Note: This Question is unanswered, help us to find answer for this one
3. A ____ is a tool that can assess the quality of the wireless signal.
Answer
Correct Answer:
Spectrum analyzer
Note: This Question is unanswered, help us to find answer for this one
4. Wi-fi networks used in homes and public hotspots use the ________.
Answer
Correct Answer:
IEEE 802.11 standards
Note: This Question is unanswered, help us to find answer for this one
5. Upon creation, each vnic is automatically assigned a ____.
Answer
Correct Answer:
MAC address
Note: This Question is unanswered, help us to find answer for this one
6. A private internet that is used exclusively within an organization is called a(n) ________.
Answer
Correct Answer:
Intranet
Note: This Question is unanswered, help us to find answer for this one
7. ______ is an economy where people are constantly buying, selling, and trading goods and services with each other?
Answer
Correct Answer:
Sharing Economy
Note: This Question is unanswered, help us to find answer for this one
8. A complete term for malicious software that is used to gain access to information stored on a computer or computer network is known as Malware?
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
9. Individuals or groups who hack into government or corporate computer networks and then release information to try to embarrass the organizations or gain leverage against the organizations is known as ____?
Answer
Correct Answer:
Hacktivists
Note: This Question is unanswered, help us to find answer for this one
10. A person who _____gains access to and sometimes tampers with information in a computer system is called a hacker ?
Answer
Correct Answer:
Legally
Note: This Question is unanswered, help us to find answer for this one
11. An organization’s efforts to protect its digital assets from outsiders is known as Digital Security?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
12. When ______ is individuals or companies practicing safeguarding user personal safety against security risks to private information and property associated with using the Internet—and the self- protection from computer crime in general.
Answer
Correct Answer:
Digital Safety
Note: This Question is unanswered, help us to find answer for this one
13. The degree to which people succeed or struggle when they use technology to navigate their environments, solve problems, and make decisions is known _____?
Answer
Correct Answer:
Digital Readiness
Note: This Question is unanswered, help us to find answer for this one
14. The ____ between those with access to new technologies and those without.?
Answer
Correct Answer:
Digital Divide
Note: This Question is unanswered, help us to find answer for this one
15. Cyberterrorism is the use of information technology by terrorist groups and individuals to further their agenda ?(is it true or false )
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
16. Cyberstalking Generally refers to the use of the Internet, e-mail, or other electronic communications devices to stalk another person—where stalking in the _______ means to engage in repeated harassing or threatening behavior.?
Answer
Correct Answer:
Traditional sense
Note: This Question is unanswered, help us to find answer for this one
17. ____ is using the Internet, cell phones, or other devices to send or post text or images intended to hurt or embarrass another person.
Answer
Correct Answer:
Cyberbullying
Note: This Question is unanswered, help us to find answer for this one