You are on page 1of 2

9/16/2017 Multiple Choice Quiz 2

Home > Chapter 9 > Multiple Choice Quiz 2

Course-wide Content
Animations
Multiple Choice Quiz 2
(Se e re late d page s)
C areers
Environment

Results Reporter
Ethics
Explore
Making IT Work
DVD Direct
Tips Out of 10 questions, you answered 8 correctly with a final grade of 80%
Privacy
8 correct (80%)
C hapte r 9 2 incorrect (20%)
Quizzes 0 unanswered
Multiple C hoice Quiz 1 (0%)
Multiple Choice Qui...
Matching Quiz 1 Your Results:
Matching Quiz 2
More Resources The correct answer for each question is indicated by a .
Flashcards
1 Which of the three privacy issues relates to the responsibility of those who have data to control who is able to use that
INCORRECT data?
A) access

B) accuracy

C) property

D) security

2 CORRECT What is the illegal assumption of someone's identity for the purposes of economic gain called?

A) fraud

B) identity theft

C) monitory transgression

D) scamming

3 These cookies record your activities across different sites.


INCORRECT
A) tracking

B) traditional

C) Web bug

D) first-party

4 CORRECT These programs record every activity and keystroke made on a computer system.

A) computer monitoring software

B) Web bug

C) virus

D) worm

5 CORRECT Individuals who gain unauthorized access to your computer or computers that contain information about others:

A) hackers

B) cryptographers

C) encoders

D) crackers

6 CORRECT This special type of virus fills a computer system with self-replicating information, clogging the system so that its
operations are slowed or stopped.
A) firewall

B) keystroke

C) worm

D) zombie

7 CORRECT This type of attack attempts to slow down or stop a computer system or network by flooding it with requests for
information and data.
A) cracker

B) denial of service

C) hacker

D) Trojan horse

8 CORRECT This type of attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized
access to a user's account.
A) denial of service

B) password

C) dictionary

D) virus

http://highered.mheducation.com/sites/0073516899/student_view0/chapter9/multiple_choice_quiz_2.html 1/2
9/16/2017 Multiple Choice Quiz 2
9 CORRECT One of the best-known wireless encryption protocols is:
A) DRM

B) HIPAA

C) VPN

D) WPA2

10 The unauthorized copying and distribution of software is called:


CORRECT
A) cracking

B) hacking

C) plagiarism

D) software piracy

E-mail Your Results

Date: Sat Sep 16 2017 17:06:58 GMT+0530 (India Standard Time)


My name:
Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML

My Instructor: HTML

My TA: HTML

Other: HTML

E-mail The Results

To le arn m ore about the book this we bsite supports, ple ase visit its Inform ation C e nte r.

Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy

http://highered.mheducation.com/sites/0073516899/student_view0/chapter9/multiple_choice_quiz_2.html 2/2

You might also like