MCQs > Educational Subjects & Courses > Sociology MCQs > Applied Sociology MCQs

Applied Sociology MCQ

All of the following were top cybercrimes reported to the ic3 in 2013 except ________.

Answer

Correct Answer: Theft of services

Note: This Question is unanswered, help us to find answer for this one

All of the following are true of virus protection software packages except ________.

Answer

Correct Answer: You can only scan the entire computer each time you perform a scan

Note: This Question is unanswered, help us to find answer for this one

The popularity of social networking is increasing most rapidly _____.

Answer

Correct Answer: Over all ages

Note: This Question is unanswered, help us to find answer for this one

Government impersonation scams involve ________.

Answer

Correct Answer: People pretending to represent official organizations such as the Dept. of Homeland Security or IRS

Note: This Question is unanswered, help us to find answer for this one

Creating and distributing ________ is one of the most widespread types of cybercrimes

Answer

Correct Answer: Computer viruses.

Note: This Question is unanswered, help us to find answer for this one

A packet analyzer is a program that can enable a hacker to do all of the following except ________.

Answer

Correct Answer: Launch a denial of service (DoS) attack on your computer

Note: This Question is unanswered, help us to find answer for this one

Weber described bureaucracies as the ____________ of modern life.

Answer

Correct Answer: Iron Cage

Note: This Question is unanswered, help us to find answer for this one

Representative democracy uses _____ of the voters to discuss the issues and make decisions.

Answer

Correct Answer: Representatives

Note: This Question is unanswered, help us to find answer for this one

An encryption ______ is a set of steps that converts readable text into unreadable text.

Answer

Correct Answer: Algorithm

Note: This Question is unanswered, help us to find answer for this one

A(n) _____ is a representation of a virtual world visitor.

Answer

Correct Answer: Avatar

Note: This Question is unanswered, help us to find answer for this one

A botnet is a ____.

Answer

Correct Answer: ​network of computers that send out access requests to servers repeatedly

Note: This Question is unanswered, help us to find answer for this one

A ____ is commonly packaged with a new computer system.

Answer

Correct Answer: Rescue disk

Note: This Question is unanswered, help us to find answer for this one

A computer ____ is malicious computer code that reproduces itself on the same computer.

Answer

Correct Answer: Virus

Note: This Question is unanswered, help us to find answer for this one

The sql injection statement ____ determines the names of different fields in a database.

Answer

Correct Answer: Whatever' AND email IS NULL; --

Note: This Question is unanswered, help us to find answer for this one

A(n) ________ takes advantage of file transport methods to spread on its own.

Answer

Correct Answer: Worm

Note: This Question is unanswered, help us to find answer for this one

_____ built a virtual world model of its salt lake refinery for training new operators.

Answer

Correct Answer: Chevron

Note: This Question is unanswered, help us to find answer for this one

A replay attack _____.

Answer

Correct Answer: Makes a copy of the transmission for use at a later time

Note: This Question is unanswered, help us to find answer for this one

Malware programs that masquerade as system files are called ________.

Answer

Correct Answer: Trojan horses

Note: This Question is unanswered, help us to find answer for this one

In a denial-of-service (ddos) attack, the perpetrator ____.

Answer

Correct Answer: Instructs the zombie computers to send simple access requests to target computers

Note: This Question is unanswered, help us to find answer for this one

The development of social media means that ________

Answer

Correct Answer: In the computer age, typical social networks now link more people

Note: This Question is unanswered, help us to find answer for this one

The choice of a research method is also referred to as the ________.

Answer

Correct Answer: Research design

Note: This Question is unanswered, help us to find answer for this one

The best defense against malware is _____________.

Answer

Correct Answer: Antivirus software

Note: This Question is unanswered, help us to find answer for this one

The process of capturing and recording network traffic is referred to as _____.

Answer

Correct Answer: Sniffing

Note: This Question is unanswered, help us to find answer for this one

Viruses differ from worms because worms ________.

Answer

Correct Answer: Can operate on their own without attaching to other computer program files

Note: This Question is unanswered, help us to find answer for this one

With ________, the sender and receiver transmit a message using different keys.

Answer

Correct Answer: Asymmetric encryption

Note: This Question is unanswered, help us to find answer for this one

Using your computer for non-work activities while you are being paid to work is known as ________.

Answer

Correct Answer: Cyberloafing

Note: This Question is unanswered, help us to find answer for this one

Rules for creating passwords include all of the following, except ________.

Answer

Correct Answer: Use a dictionary to find a lengthy word that is easy to remember

Note: This Question is unanswered, help us to find answer for this one

Most packets are part of the ________ state.

Answer

Correct Answer: Neither connection opening nor connection closing

Note: This Question is unanswered, help us to find answer for this one

Level 1 security involves ____.

Answer

Correct Answer: Front-end servers

Note: This Question is unanswered, help us to find answer for this one

Large amounts of data stored in electronic form are ________ than the same data in manual form.

Answer

Correct Answer: Vulnerable to many more kinds of threats

Note: This Question is unanswered, help us to find answer for this one

In information security, an example of a threat agent can be ____.

Answer

Correct Answer: A force of nature such as a tornado that could destroy computer equipment, A virus that attacks a computer network, A person attempting to break into a secure computer network

Note: This Question is unanswered, help us to find answer for this one

Establishing a risk level of malware threats to an organization is an example of _______________.

Answer

Correct Answer: Risk assessment

Note: This Question is unanswered, help us to find answer for this one

Botnets are designed to steal _____ from the victim.

Answer

Correct Answer: Computing resources

Note: This Question is unanswered, help us to find answer for this one

Antivirus software products require that you update _____ on a regular basis.

Answer

Correct Answer: Virus definitions

Note: This Question is unanswered, help us to find answer for this one

Antivirus software looks for ____ to detect viruses in files.

Answer

Correct Answer: Virus signatures

Note: This Question is unanswered, help us to find answer for this one

An information system’s _____ is the possibility that the system will be harmed by a threat.

Answer

Correct Answer: Vuknerability

Note: This Question is unanswered, help us to find answer for this one

_____________ are the main source of distributed denial of service (ddos) attacks and spam.

Answer

Correct Answer: Botnets

Note: This Question is unanswered, help us to find answer for this one

________ includes computer viruses, worms, and trojan horses.

Answer

Correct Answer: Malware

Note: This Question is unanswered, help us to find answer for this one

_____ is a standalone, self-replicating, malicious program designed to spread to other computers

Answer

Correct Answer: Computer worm

Note: This Question is unanswered, help us to find answer for this one

____ ensures that only authorized parties can view information.

Answer

Correct Answer: Confidentiality

Note: This Question is unanswered, help us to find answer for this one

____ ensures data security and integrity over public networks, such as the internet.

Answer

Correct Answer: Transport Layer Security

Note: This Question is unanswered, help us to find answer for this one

search
More Sociology Subjects