Have a Question ?

Home / Answered Questions / CIS 105 / cis-105-abcc-quiz-chapter-8-knowledge-check-q-443

(Solved): cis 105 ABCC - Quiz | Chapter 8 Knowledge Check...


ABCC - Quiz | Chapter 8 Knowledge Check

 

Submission Score:

100 / 100 (100.00%)

Top of Form

  1. Yahoo, Google, and Bing are examples of _____________.
    • Search engines
    • Bots
    • Spiders
    • Directories

FEEDBACK

10 / 10  (100.0%)

  1. Social engineering is _________________.
    • Deception used to manipulate individuals into divulging confidential information
    • Spam email that requests information of a personal nature
    • A con scheme to gain personal information
    • Impersonation of another individual

FEEDBACK

10 / 10  (100.0%)

  1. Put the IoT life cycle actions in the correct order.
    • Collect, analyze, communicate, act
    • Analyze, collect, communicate, act
    • Collect, communicate, analyze, act
    • Communicate, collect, analyze, act

FEEDBACK

10 / 10  (100.0%)

  1. What is one reason the internet is moving from IPv4 to IPv6?
    • IPv4 software needs to be upgraded to IPv6.
    • IoT devices have used up all the IPv4 addresses.
    • IPv6 has better security protocols.
    • RISC processors require IPv6.

FEEDBACK

10 / 10  (100.0%)

  1. A separate window that opens within a browser without user interaction is known as a _________________.
    • Ad block
    • Frame
    • Popup
    • Frame area

FEEDBACK

10 / 10  (100.0%)

  1. The ________ is composed of millions of smart devices and sensors connected to the internet.
    • Internet of Things
    • Cloud
    • Cell network
    • Extranet

FEEDBACK

10 / 10  (100.0%)

  1. Which type of malware usually activates at a future date?
    • Worm
    • Trojan horse
    • Spyware
    • Virus

FEEDBACK

10 / 10  (100.0%)

  1. Which type malware has the ability to be self-replicating?
    • Worm
    • Spyware
    • Trojan horse
    • Virus

FEEDBACK

10 / 10  (100.0%)

  1. Trojan horse
    • Software that routinely displays advertising to a computer system after it has been installed
    • A harmless or interesting looking program that, when executed, unleashes harmful viruses into a user’s system
    • A malicious program that spreads quickly and is extremely harmful but it does not need to attach itself to an existing program
    • The practice of redirecting an internet user to a bogus website that mimics the appearance of a legitimate site in order to obtain personal information

FEEDBACK

10 / 10  (100.0%)

  1. Which type of malware gleans personal data and information about the user without his or her knowledge?
    • Trojan horse
    • Virus
    • Spyware
    • Worm

FEEDBACK

10 / 10  (100.0%)

 



We have an Answer from Expert View Expert Answer

Expert Answer


We have an Answer from Expert
Buy This Answer $12

-- OR --

Subscribe To View Unlimited Answers
Subscribe $20 / Month