[SOLVED] Type of malware..

[SOLVED] Type of malware..

Question 1 type of malware

Which type of malware self-replicates between computers (from one computer to another)?
a.
rootkit
b.
virus
c.
Trojan
d.
worm

Question 2

What type of device is inserted between the computer keyboard connection and USB port for the purposes of stealing information?
a.
keylogger
b.
rootkit
c.
zombie
d.
backdoor

Question 3

What type of software update is a cumulative package of all patches and feature updates?
a.
patch group
b.
exploit
c.
service pack
d.
bulletin

Question 4

An infected robot computer is known as a ____.
a.
beachhead
b.
zombie
c.
bottle
d.
Trojan horse

Question 5

What can an attacker use that gives them access to a computer program or service that circumvents normal security protections?
a.
bot herder
b.
botnet
c.
adware
d.
backdoor

Question 6

Which Windows feature provides information to users and obtains their approval before a program can make a change to the computer’s settings?
a.
System Settings Authorization
b.
Access Based Enumeration
c.
User Account Control
d.
Application Modification Control

Question 7

It is NOT necessary for BAs to train their workforce on PHI policy and procedures.

 

 

Question 8

Patients have the right to access their record within ________ days

A.

2

B.

10

C.

30

D.

60

Question 9

 Dr. Kim gives extra pens to his patients. The pens contain the name Quick-Fix, an ointment used for dermatitis. According to HIPAA, this communication is:
A.
marketing, and does require authorization
B.
marketing, and does not require authorization
C.
not marketing
D.
a health care operation

Question 10

A limited data set used for research:
A.
is deidentified data
B.
is PHI and protected by HIPAA
C.
requires the opportunity to agree or object
D.
requires authorization to be disclosed

Question 11

The public interest and benefit disclosure is best illustrated by which of the following:
A.
Public health activities
B.
Medical treatment
C.
Utilization review
D.
None of the above

Question 12Public interest and benefit disclosures:A.
do not require the patient’s written authorization or verbal agreementB.
require an individual’s verbal agreementC.
require an individual’s written authorizationD.
include incidental disclosures

Question 13If a patient refuses to sign a(n) _____________________________, treatment may be conditioned.A.
AuthorizationB.
ConsentC.
Notice of Privacy PracticesD.
AmendmentQuestion 14What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?
a. hash
b. brute force
c. man in the middle
d. dictionaryQuestion 15Which document identifies individuals within the organization who are in positions of authority?
a. System manuals
b. Policy manuals
c. Organizational charts
d. Phone directoriesQuestion 16What can an attacker use to divert all mail to their post office box so that the victim is never aware that personal information has been stolen?
a. mail bouncing
b. change-of-address form
c. automatic forwarding
d. mail redirectQuestion 17Which of the following is a numerical measurement used by lenders to assess a consumer’s creditworthiness?
a. credit report
b. credit rank
c. credit score
d. credit levelQuestion 18With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are requested to update personal information, such as passwords or credit card numbers?
a. pretexting
b. phishing
c. pharming
d. typo squatting

Question 19What law contains rules regarding consumer privacy?
a. Accurate Transactions Act
b. Fair Credit Reporting Act
c. Fair and Accurate Credit Transactions Act
d. Credit and Transactions ActQuestion 20Proving that a document was created by a particular user is referred to as which of the following?
a. availability
b. nonrepudiation
c. repudiation
d. integrity

Question 21Which of the following is NOT true about privacy?
a. Privacy of any level that you desire is easily achievable today.
b. Privacy is the state or condition of being free from public attention to the degree that you determine.
c. Privacy is difficult due to the fact that Data is collected on almost all actions and transactions that individuals perform.
d. Privacy is the right to be left alone to the level that you choose.Question 22Which of the following is a risk associated with the use of private data?
a. Constant use of encryption.
b. Malfunctioning hardware devices.
c. Associations with groups.
d. Statistical anomalies.

Question 23Which technology hides the existence of data?
a. Symmetric encryption
b. Cryptography
c. Steganography
d. Asymmetric decryptionQuestion 24Which of the following creates a digest and does not create ciphertext that can later be decrypted?
a. symmetric cryptography
b. Message Digest Encryption (MDE)
c. asymmetric cryptography
d. hash algorithmQuestion 25What is another name for asymmetric cryptography?
a.
Public key cryptography
b.
Unbalanced encryption
c.
Secret key cryptography
d.
Private encryptionQuestion 27____ is a complete programming language that can be used to create stand-alone applications.
a. WScript
b. JavaScript
c. Java
d. Shell scriptQuestion 28Using what email protocol can mail be organized into folders on the mail server and read from any device?
a. HTML
b. IMAP
c. POP3
d. SMTPQuestion 29Which of the following uses graphical images of text in order to circumvent text-based filters?
a. Image spam
b. Java spam
c. Flash spam
d. PDF spamQuestion 30HTTP is based on which larger set of standards for Internet communication?
a. NetBEUI
b. IEEE 802.11
c. IPX/SPX
d. TCP/IPQuestion 31Using which Internet security best practice is information not saved by the browser, such as pages that are visited will not be recorded to history or the address bar?
a. controlling cookies
b. private browsing
c. downloading files
d. clearing the cache type of malware type of malware type of malware


Are you overwhelmed by your class schedule and need help completing this assignment? You deserve the best professional and plagiarism-free writing services. Allow us to take the weight off your shoulders by clicking this button.

Get help

Who Will Write your Paper

Writer avatar
Tutor_Charles

Rating: 4.9/5    Reviews 377

Success rate 96%

Completed projects: 545

I am an experienced writer offering professional services across diverse fields. I provide quality work with strict adherence to the deadline.

Writer avatar
Tutor_Dr. Edith

Rating: 4.8/5    Reviews 381

Success rate 99%

Completed projects: 490

I am an experienced writer with great research and analytical skills. Original quality paper and on-time delivery are guaranteed. Let's do this!

Writer avatar
Tutor_Dr.Judy

Rating: 4.7/5    Reviews 316

Success rate 99%

Completed projects: 398

I am a professional writer with more than 8 years of experience. My mission is to provide you with high-quality paper in a timely fashion.

Writer avatar
Tutor_Ian

Rating: 4.8/5    Reviews 371

Success rate 99%

Completed projects: 432

Hi, I deliver quality papers on time following all the instructions provided. Client's satisfaction is my priority. Welcome for plagiarism-free papers.

Writer avatar
Tutor_Prof. Allan

Rating: 4.8/5    Reviews 400

Success rate 98%

Completed projects: 487

With over half a decade of academic experience, I'm committed both to efficiency and punctuality. If it's quality you're looking for, then I'm here to provide!

Writer avatar
Tutor_Prof. Gabie

Rating: 4.9/5    Reviews 447

Success rate 100%

Completed projects: 546

A quality-driven, skilled writer with over 5 years of experience in various disciplines. I deliver plagiarism-free papers and content of impeccable quality, always original and always before the deadline!

Writer avatar
Tutor_Sarah

Rating: 4.9/5    Reviews 427

Success rate 98%

Completed projects: 567

I have been a full-time freelance researcher and writer for a period of over 6 years. I have successfully completed over 1000 projects and assignments. I have had a good professional relationship with my clients. Try me today!

Writer avatar
Tutor_Stella

Rating: 4.9/5    Reviews 305

Success rate 97%

Completed projects: 404

I am a proficient writer with knowledge across a wide range of academic disciplines. I guarantee quality, timely and original content.

Writer avatar
Tutor_SylviaYoung

Rating: /5    Reviews 419

Success rate 99%

Completed projects: 506

Hi, count on me to deliver quality and exemplary papers. I will pay attention to all your instructions, and meet all your expectations.