How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask getsetgo Your Own Question

getsetgo , MBA
Category: Homework
Satisfied Customers: 3486
Experience:  MBA from IIM Calcutta, Engineer, 8+ years of exp. at executive level
Type Your Homework Question Here...
getsetgo is online now
A new question is answered every 9 seconds

Strategic IT 1. Viruses that attach themselves to files

Resolved Question:

Strategic IT

1. Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
A. boot sector
B. file infector
C. file destroyer
D. file command

2. According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent

3. __________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee

4. Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling

5. One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering

6. Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.

7. A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.

8. The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above

9. __________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software

10. Encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above

11. The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.

12. __________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls

13. The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.

14. A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan

15. Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.

16. ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.

17. To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android

18. Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.

19. Futurist author Alvin Toffler describes three "waves of change." The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.

20. Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.
A. freaking
B. tricking
C. phishing
D. luring
Submitted: 3 years ago.
Category: Homework
Expert:  getsetgo replied 3 years ago.

You need to spend $3 to view this post. Add Funds to your account and buy credits.
getsetgo, MBA
Category: Homework
Satisfied Customers: 3486
Experience: MBA from IIM Calcutta, Engineer, 8+ years of exp. at executive level
getsetgo and 4 other Homework Specialists are ready to help you

JustAnswer in the News:

Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.

What Customers are Saying:

  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
< Previous | Next >
  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
  • This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!! Alex Los Angeles, CA
  • Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult. GP Hesperia, CA
  • I couldn't be more satisfied! This is the site I will always come to when I need a second opinion. Justin Kernersville, NC
  • Just let me say that this encounter has been entirely professional and most helpful. I liked that I could ask additional questions and get answered in a very short turn around. Esther Woodstock, NY
  • Thank you so much for taking your time and knowledge to support my concerns. Not only did you answer my questions, you even took it a step further with replying with more pertinent information I needed to know. Robin Elkton, Maryland
  • He answered my question promptly and gave me accurate, detailed information. If all of your experts are half as good, you have a great thing going here. Diane Dallas, TX

Meet The Experts:

  • LogicPro



    Satisfied Customers:

    Expert in Java C++ C C# VB Javascript Design SQL HTML
< Last | Next >
  • LogicPro's Avatar



    Satisfied Customers:

    Expert in Java C++ C C# VB Javascript Design SQL HTML
  • Manal Elkhoshkhany's Avatar

    Manal Elkhoshkhany


    Satisfied Customers:

    More than 5000 online tutoring sessions.
  • Linda_us's Avatar


    Finance, Accounts & Homework Tutor

    Satisfied Customers:

    Post Graduate Diploma in Management (MBA)
  • Chris M.'s Avatar

    Chris M.

    M.S.W. Social Work

    Satisfied Customers:

    Master's Degree, strong math and writing skills, experience in one-on-one tutoring (college English)
  • F. Naz's Avatar

    F. Naz

    Chartered Accountant

    Satisfied Customers:

    Experience with chartered accountancy
  • Bizhelp's Avatar



    Satisfied Customers:

    Bachelors Degree and CPA with Accounting work experience
  • Seanna's Avatar



    Satisfied Customers:

    3,000+ satisfied customers, all topics, A+ work