Try to answer these 40+ Applied Sociology MCQs and check your understanding of the Applied Sociology subject. Scroll down and let's begin!
A. Transport Layer Security
B. Terminal Resource Security
C. Transmission Control Protocol
D. User Datagram Protocol
A. Availability
B. Integrity
C. Confidentiality
D. ICA
A. Computer worm
B. Nagware
C. Ransomware
D. Trojan horse
A. HIPPA
B. SSL
C. Malware
D. Authentication
A. Botnets
B. Trojans
C. Stealth viruses
D. Logic bombs
A. A trade secret
B. Trade secret
C. Vuknerability
D. Alien software
A. Antivirus software
B. Boot sector virus
C. Virus signatures
D. Polymorphic virus
A. Hard drives
B. User names
C. Passwords
D. Virus definitions
A. Denial of service
B. XSS Attack
C. SQL injection attack
D. Computing resources
E. Man in the middle
A. Social engineering
B. Risk assessment
C. Biometric
D. ​denial-of-service
A. Theft of Information, A delay in transmitting information that results in a financial penalty, The loss of good will or a reputation
B. A force of nature such as a tornado that could destroy computer equipment, A virus that attacks a computer network, A person attempting to break into a secure computer network
C. Indonesia
D. Manager
A. Less vulnerable to damage
B. More secure
C. Vulnerable to many more kinds of threats
D. More critical to most businesses
E. Prone to more errors
A. Back-end systems
B. Corporate networks
C. Physical security
D. Front-end servers
A. Mechanical failure, environmental casualties, malware
B. Neither connection opening nor connection closing
C. Both what data should be backed up and backup restoration tests
D. Implement strong and clear backup policies
A. Use a dictionary to find a lengthy word that is easy to remember
B. Change your password frequently
C. Keep your password a secret
D. Use letters, numbers and symbols in your passwords
A. Cyberlazing
B. Cyberbreaking
C. Cyberloafing
D. Cybersleeping
A. Remove the user account and password
B. A hacker floods a Web server with millions of bogus service requests
C. Hacking of information systems
D. Asymmetric encryption
A. Sniffer; is never legitimately used
B. Can operate on their own without attaching to other computer program files
C. A password
D. Databases
A. Sniffing
B. Spoofing
C. Phishing
D. Pharming
A. Address spoofing
B. Antivirus software
C. Address spoofing, IMSI catchers, Evil Twins
D. Social engineering
A. Operational definition
B. A case study
C. A multiple-choice exam
D. Research design
A. Bank tellers being replaced with automatic teller machines (ATMs).
B. That the organizational principles of McDonald's have come to dominate our social life.
C. Technology that links people in social activity.
D. In the computer age, typical social networks now link more people
A. Instructs the zombie computers to send simple access requests to target computers
B. ​sends out a huge number of spam emails to all of those in your contacts list
C. Changes the configuration information of the infected computers
D. Refuses to accept any email from any sender
A. Viruses
B. Scripts
C. Payloads
D. Trojan horses
A. Makes a copy of the transmission for use at a later time
B. Insert SQL statements through unfiltered user input
C. Reformat the web application server's hard drive
D. Host table and external DNS server
A. School system
B. Chevron
C. Viral marketing
D. Offensive behavior online can be mediated by administrators
A. Worm
B. Script virus
C. Encryption virus
D. Macro virus
A. Whatever AND email IS NULL; --
B. Whatever; AND email IS NULL; --
C. Whatever" AND email IS NULL; --
D. Whatever' AND email IS NULL; --
A. Virus
B. Worm
C. Adware
D. Spyware
A. Token
B. Keychain fob
C. Rescue disk
D. Scan
A. Network of servers that exchange traffic data
B. Network of robots that control an assembly line at a factory
C. ​network of computers that send out access requests to servers repeatedly
D. Network of devices that are used for managing security
A. Icon
B. Robot
C. Avatar
D. Mythical character
A. Algorithm
B. Method
C. Key
D. Series
A. Representatives
B. Democratic
C. Authoritarian
D. Laissez-faire
A. Iron Cage
B. Representatives
C. Democratic
D. Authoritarian
E. Laissez-faire
A. Use your debit card information to purchase items illegally
B. Assume your identity
C. Steal your logons and passwords for various accounts
D. Launch a denial of service (DoS) attack on your computer
A. Spam.
B. Computer viruses.
C. Cookies.
D. Zombies
A. People pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B. Running auctions that do not exist
C. Convincing people to send money as a
D. Collecting funds and not delivering the goods
A. Over all ages
B. Deals or offers
C. Direct Advertising
D. Cyberstalking
A. Identity theft
B. Non-auction scam
C. Advance fee fraud
D. You can only scan the entire computer each time you perform a scan
A. Theft of services
B. Packet filtering
C. Encryption virus
D. Pretexting