MCQs > Educational Subjects & Courses > Sociology MCQs > Applied Sociology MCQs

Applied Sociology MCQ

Applied Sociology

1. All of the following were top cybercrimes reported to the ic3 in 2013 except ________.

Answer

Correct Answer: Theft of services

Note: This Question is unanswered, help us to find answer for this one

2. All of the following are true of virus protection software packages except ________.

Answer

Correct Answer: You can only scan the entire computer each time you perform a scan

Note: This Question is unanswered, help us to find answer for this one

3. The popularity of social networking is increasing most rapidly _____.

Answer

Correct Answer: Over all ages

Note: This Question is unanswered, help us to find answer for this one

4. Government impersonation scams involve ________.

Answer

Correct Answer: People pretending to represent official organizations such as the Dept. of Homeland Security or IRS

Note: This Question is unanswered, help us to find answer for this one

5. Creating and distributing ________ is one of the most widespread types of cybercrimes

Answer

Correct Answer: Computer viruses.

Note: This Question is unanswered, help us to find answer for this one

6. A packet analyzer is a program that can enable a hacker to do all of the following except ________.

Answer

Correct Answer: Launch a denial of service (DoS) attack on your computer

Note: This Question is unanswered, help us to find answer for this one

7. Weber described bureaucracies as the ____________ of modern life.

Answer

Correct Answer: Iron Cage

Note: This Question is unanswered, help us to find answer for this one

8. Representative democracy uses _____ of the voters to discuss the issues and make decisions.

Answer

Correct Answer: Representatives

Note: This Question is unanswered, help us to find answer for this one

9. An encryption ______ is a set of steps that converts readable text into unreadable text.

Answer

Correct Answer: Algorithm

Note: This Question is unanswered, help us to find answer for this one

10. A(n) _____ is a representation of a virtual world visitor.

Answer

Correct Answer: Avatar

Note: This Question is unanswered, help us to find answer for this one

11. A botnet is a ____.

Answer

Correct Answer: ​network of computers that send out access requests to servers repeatedly

Note: This Question is unanswered, help us to find answer for this one

12. A ____ is commonly packaged with a new computer system.

Answer

Correct Answer: Rescue disk

Note: This Question is unanswered, help us to find answer for this one

13. A computer ____ is malicious computer code that reproduces itself on the same computer.

Answer

Correct Answer: Virus

Note: This Question is unanswered, help us to find answer for this one

14. The sql injection statement ____ determines the names of different fields in a database.

Answer

Correct Answer: Whatever' AND email IS NULL; --

Note: This Question is unanswered, help us to find answer for this one

15. A(n) ________ takes advantage of file transport methods to spread on its own.

Answer

Correct Answer: Worm

Note: This Question is unanswered, help us to find answer for this one

16. _____ built a virtual world model of its salt lake refinery for training new operators.

Answer

Correct Answer: Chevron

Note: This Question is unanswered, help us to find answer for this one

17. A replay attack _____.

Answer

Correct Answer: Makes a copy of the transmission for use at a later time

Note: This Question is unanswered, help us to find answer for this one

18. Malware programs that masquerade as system files are called ________.

Answer

Correct Answer: Trojan horses

Note: This Question is unanswered, help us to find answer for this one

19. In a denial-of-service (ddos) attack, the perpetrator ____.

Answer

Correct Answer: Instructs the zombie computers to send simple access requests to target computers

Note: This Question is unanswered, help us to find answer for this one

20. The development of social media means that ________

Answer

Correct Answer: In the computer age, typical social networks now link more people

Note: This Question is unanswered, help us to find answer for this one

21. The choice of a research method is also referred to as the ________.

Answer

Correct Answer: Research design

Note: This Question is unanswered, help us to find answer for this one

22. The best defense against malware is _____________.

Answer

Correct Answer: Antivirus software

Note: This Question is unanswered, help us to find answer for this one

23. The process of capturing and recording network traffic is referred to as _____.

Answer

Correct Answer: Sniffing

Note: This Question is unanswered, help us to find answer for this one

24. Viruses differ from worms because worms ________.

Answer

Correct Answer: Can operate on their own without attaching to other computer program files

Note: This Question is unanswered, help us to find answer for this one

25. With ________, the sender and receiver transmit a message using different keys.

Answer

Correct Answer: Asymmetric encryption

Note: This Question is unanswered, help us to find answer for this one

26. Using your computer for non-work activities while you are being paid to work is known as ________.

Answer

Correct Answer: Cyberloafing

Note: This Question is unanswered, help us to find answer for this one

27. Rules for creating passwords include all of the following, except ________.

Answer

Correct Answer: Use a dictionary to find a lengthy word that is easy to remember

Note: This Question is unanswered, help us to find answer for this one

28. Most packets are part of the ________ state.

Answer

Correct Answer: Neither connection opening nor connection closing

Note: This Question is unanswered, help us to find answer for this one

29. Level 1 security involves ____.

Answer

Correct Answer: Front-end servers

Note: This Question is unanswered, help us to find answer for this one

30. Large amounts of data stored in electronic form are ________ than the same data in manual form.

Answer

Correct Answer: Vulnerable to many more kinds of threats

Note: This Question is unanswered, help us to find answer for this one

31. In information security, an example of a threat agent can be ____.

Answer

Correct Answer: A force of nature such as a tornado that could destroy computer equipment, A virus that attacks a computer network, A person attempting to break into a secure computer network

Note: This Question is unanswered, help us to find answer for this one

32. Establishing a risk level of malware threats to an organization is an example of _______________.

Answer

Correct Answer: Risk assessment

Note: This Question is unanswered, help us to find answer for this one

33. Botnets are designed to steal _____ from the victim.

Answer

Correct Answer: Computing resources

Note: This Question is unanswered, help us to find answer for this one

34. Antivirus software products require that you update _____ on a regular basis.

Answer

Correct Answer: Virus definitions

Note: This Question is unanswered, help us to find answer for this one

35. Antivirus software looks for ____ to detect viruses in files.

Answer

Correct Answer: Virus signatures

Note: This Question is unanswered, help us to find answer for this one

36. An information system’s _____ is the possibility that the system will be harmed by a threat.

Answer

Correct Answer: Vuknerability

Note: This Question is unanswered, help us to find answer for this one

37. _____________ are the main source of distributed denial of service (ddos) attacks and spam.

Answer

Correct Answer: Botnets

Note: This Question is unanswered, help us to find answer for this one

38. ________ includes computer viruses, worms, and trojan horses.

Answer

Correct Answer: Malware

Note: This Question is unanswered, help us to find answer for this one

39. _____ is a standalone, self-replicating, malicious program designed to spread to other computers

Answer

Correct Answer: Computer worm

Note: This Question is unanswered, help us to find answer for this one

40. ____ ensures that only authorized parties can view information.

Answer

Correct Answer: Confidentiality

Note: This Question is unanswered, help us to find answer for this one

41. ____ ensures data security and integrity over public networks, such as the internet.

Answer

Correct Answer: Transport Layer Security

Note: This Question is unanswered, help us to find answer for this one

search
Sociology Subjects