report this ad
Just For Fun
Games to Consider
Create a Quiz
Add a New Topic
Locations & Scores
Become a Host
/ marketing chapter 9
Can you name the marketing chapter 9?
Quiz not verified by Sporcle
Mini Paint-By-Numbers 1
Less Than 100k Countries
Find the US States - No Outlines Minefield
'M' Cartoon Characters by Picture
Green or Red? A Picture Click Logic Puzzle
Rate 5 stars
Rate 4 stars
Rate 3 stars
Rate 2 stars
Rate 1 star
ADD to PLAYLIST
Forced Order No Skip
Hard Rock Locations
focused regular attention directed at particular individuals?
unlimited access to tools and technology; information wants to be free; evaluated based strictly on merit; promise of technology ?
hackers test info systems to make sure everything is secure?
attack information systems with the intent of committing a crime?
the following are all types of what? data diddling o salami slicing o phreaking o piggy-backing o social engineering o phishing o cyberstalking o spam ?
when someone assumes another’s identity and expects to benefit from the impersonation?
independent computer program, spreads more quickly than viruses. does not usually destroy data?
rogue software program that attaches itself to other programs. Delivers a payload destroys data?
code can be set to perform its malicious intent at a certain time or when a specific function is run?
an eaves dropping program that monitors information traveling over a network?
hackers flood a network with false communication data is not destroyed but companies cannot get information out to their customers?
is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached t
collection of computers infected with malware. Are referred to as Zombie computers. They function normally until they are given instructions?
is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.?
confirming users identities, granting permission to read sources and information?
encryption and firewalls?
anti-virus protection software?
report this ad
You're not logged in!
Compare scores with friends on all Sporcle quizzes.
Connect with Facebook
Connect with Google
Sign Up with Email
You Might Also Like...
College or University?
Universities with the Best Professor Pay
(warning: may contain spoilers)
Top Games Today in Miscellaneous
Which Car Company?
Almost Useless Trivia X
Tiny Almost Useless Trivia XV
Clickable Matching Pairs
Top Games with Similar Tags
Ivy League Schools
College Towns II
Top User Games in Miscellaneous
Who's That Thing Named For?
Can you click the space bar 300 times in 1 minute?
Slogan to Logo Match - Beverages
Simpsons Children's Books
Your Account Isn't Verified!
In order to create a playlist on Sporcle, you need to verify the email address you used during registration. Go to your
to finish the process.
report this ad
mentally stimulating diversions
Quizzes for your site
Report a Problem
Copyright © 2007-2016 Sporcle, Inc.
Go to the Sporcle.com Mobile Site →