Q.1
A ____ cookie remains on your computer until the expiration date is reached.
  • session
  • persistent
  • third-party
  • super
Q.2
A ____ cookie is deleted when the user’s web browser is closed.
  • session
  • shopping
  • persistent
  • third-party
Q.3
____ refers to using a lie or scam to obtain private information.
  • Digital footprint
  • Public records
  • Pretexting
  • Dumpster diving
Q.4
Which best describes the results of the following search-engine query:World cup soccer -England
  • Search results show only world-cup soccer links to the England team
  • Search results show world-cup soccer prioritizing links for the England team
  • Search results show world-cup soccer omitting references to the England team
  • Search results show world-cup soccer deprioritizing links to the England
Q.5
Obtaining information as it is typed is a characteristic of a ____.
  • worm
  • keylogger
  • polymorphic virus
  • macro virus
Q.6
A ____ occurs when an antimalware program identifies a file as malware, but the file is a valid, nonmalicious file.
  • false positive
  • false negative
  • true positive
  • true negative
Q.7
Which of the following search queries will allow you to search the Internet for hardware-specific keyloggers with the best result?
  • keylogger -hardware
  • Site:hardware keylogger
  • keylogger +hardware
  • keylogger -software +hardware
Q.8
What does 'integrity of data' mean?
  • "Accuracy and completeness of the data"
  • "Data should be viewable at all times"
  • "Data should be access by only the right people"
  • "None of the above"
Q.9
Which of these legal regulations requires publicly traded companies to ensure data is not hidden, deleted, or altered?
  • SOX
  • GLBA
  • CFAA
  • ECPA
Q.10
A group of computers that is networked together and used by hackers to steal info. is called..
  • Botnet
  • Rootkit
  • DDoS
  • Operating System
0 h : 0 m : 1 s