Applied Sociology MCQs

Applied Sociology MCQs

Try to answer these 40+ Applied Sociology MCQs and check your understanding of the Applied Sociology subject. Scroll down and let's begin!

1: ____ ensures data security and integrity over public networks, such as the internet.

A.   Transport Layer Security

B.   Terminal Resource Security

C.   Transmission Control Protocol

D.   User Datagram Protocol

2: ____ ensures that only authorized parties can view information.

A.   Availability

B.   Integrity

C.   Confidentiality

D.   ICA

3: _____ is a standalone, self-replicating, malicious program designed to spread to other computers

A.   Computer worm

B.   Nagware

C.   Ransomware

D.   Trojan horse

4: ________ includes computer viruses, worms, and trojan horses.

A.   HIPPA

B.   SSL

C.   Malware

D.   Authentication

5: _____________ are the main source of distributed denial of service (ddos) attacks and spam.

A.   Botnets

B.   Trojans

C.   Stealth viruses

D.   Logic bombs

6: An information system’s _____ is the possibility that the system will be harmed by a threat.

A.   A trade secret

B.   Trade secret

C.   Vuknerability

D.   Alien software

7: Antivirus software looks for ____ to detect viruses in files.

A.   Antivirus software

B.   Boot sector virus

C.   Virus signatures

D.   Polymorphic virus

8: Antivirus software products require that you update _____ on a regular basis.

A.   Hard drives

B.   User names

C.   Passwords

D.   Virus definitions

9: Botnets are designed to steal _____ from the victim.

A.   Denial of service

B.   XSS Attack

C.   SQL injection attack

D.   Computing resources

E.   Man in the middle

10: Establishing a risk level of malware threats to an organization is an example of _______________.

A.   Social engineering

B.   Risk assessment

C.   Biometric

D.   ​denial-of-service

11: In information security, an example of a threat agent can be ____.

A.   Theft of Information, A delay in transmitting information that results in a financial penalty, The loss of good will or a reputation

B.   A force of nature such as a tornado that could destroy computer equipment, A virus that attacks a computer network, A person attempting to break into a secure computer network

C.   Indonesia

D.   Manager

12: Large amounts of data stored in electronic form are ________ than the same data in manual form.

A.   Less vulnerable to damage

B.   More secure

C.   Vulnerable to many more kinds of threats

D.   More critical to most businesses

E.   Prone to more errors

13: Level 1 security involves ____.

A.   Back-end systems

B.   Corporate networks

C.   Physical security

D.   Front-end servers

14: Most packets are part of the ________ state.

A.   Mechanical failure, environmental casualties, malware

B.   Neither connection opening nor connection closing

C.   Both what data should be backed up and backup restoration tests

D.   Implement strong and clear backup policies

15: Rules for creating passwords include all of the following, except ________.

A.   Use a dictionary to find a lengthy word that is easy to remember

B.   Change your password frequently

C.   Keep your password a secret

D.   Use letters, numbers and symbols in your passwords

16: Using your computer for non-work activities while you are being paid to work is known as ________.

A.   Cyberlazing

B.   Cyberbreaking

C.   Cyberloafing

D.   Cybersleeping

17: With ________, the sender and receiver transmit a message using different keys.

A.   Remove the user account and password

B.   A hacker floods a Web server with millions of bogus service requests

C.   Hacking of information systems

D.   Asymmetric encryption

18: Viruses differ from worms because worms ________.

A.   Sniffer; is never legitimately used

B.   Can operate on their own without attaching to other computer program files

C.   A password

D.   Databases

19: The process of capturing and recording network traffic is referred to as _____.

A.   Sniffing

B.   Spoofing

C.   Phishing

D.   Pharming

20: The best defense against malware is _____________.

A.   Address spoofing

B.   Antivirus software

C.   Address spoofing, IMSI catchers, Evil Twins

D.   Social engineering

21: The choice of a research method is also referred to as the ________.

A.   Operational definition

B.   A case study

C.   A multiple-choice exam

D.   Research design

22: The development of social media means that ________

A.   Bank tellers being replaced with automatic teller machines (ATMs).

B.   That the organizational principles of McDonald's have come to dominate our social life.

C.   Technology that links people in social activity.

D.   In the computer age, typical social networks now link more people

23: In a denial-of-service (ddos) attack, the perpetrator ____.

A.   Instructs the zombie computers to send simple access requests to target computers

B.   ​sends out a huge number of spam emails to all of those in your contacts list

C.   Changes the configuration information of the infected computers

D.   Refuses to accept any email from any sender

24: Malware programs that masquerade as system files are called ________.

A.   Viruses

B.   Scripts

C.   Payloads

D.   Trojan horses

25: A replay attack _____.

A.   Makes a copy of the transmission for use at a later time

B.   Insert SQL statements through unfiltered user input

C.   Reformat the web application server's hard drive

D.   Host table and external DNS server

26: _____ built a virtual world model of its salt lake refinery for training new operators.

A.   School system

B.   Chevron

C.   Viral marketing

D.   Offensive behavior online can be mediated by administrators

27: A(n) ________ takes advantage of file transport methods to spread on its own.

A.   Worm

B.   Script virus

C.   Encryption virus

D.   Macro virus

28: The sql injection statement ____ determines the names of different fields in a database.

A.   Whatever AND email IS NULL; --

B.   Whatever; AND email IS NULL; --

C.   Whatever" AND email IS NULL; --

D.   Whatever' AND email IS NULL; --

29: A computer ____ is malicious computer code that reproduces itself on the same computer.

A.   Virus

B.   Worm

C.   Adware

D.   Spyware

30: A ____ is commonly packaged with a new computer system.

A.   Token

B.   Keychain fob

C.   Rescue disk

D.   Scan

31: A botnet is a ____.

A.   Network of servers that exchange traffic data

B.   Network of robots that control an assembly line at a factory

C.   ​network of computers that send out access requests to servers repeatedly

D.   Network of devices that are used for managing security

32: A(n) _____ is a representation of a virtual world visitor.

A.   Icon

B.   Robot

C.   Avatar

D.   Mythical character

33: An encryption ______ is a set of steps that converts readable text into unreadable text.

A.   Algorithm

B.   Method

C.   Key

D.   Series

34: Representative democracy uses _____ of the voters to discuss the issues and make decisions.

A.   Representatives

B.   Democratic

C.   Authoritarian

D.   Laissez-faire

35: Weber described bureaucracies as the ____________ of modern life.

A.   Iron Cage

B.   Representatives

C.   Democratic

D.   Authoritarian

E.   Laissez-faire

36: A packet analyzer is a program that can enable a hacker to do all of the following except ________.

A.   Use your debit card information to purchase items illegally

B.   Assume your identity

C.   Steal your logons and passwords for various accounts

D.   Launch a denial of service (DoS) attack on your computer

37: Creating and distributing ________ is one of the most widespread types of cybercrimes

A.   Spam.

B.   Computer viruses.

C.   Cookies.

D.   Zombies

38: Government impersonation scams involve ________.

A.   People pretending to represent official organizations such as the Dept. of Homeland Security or IRS

B.   Running auctions that do not exist

C.   Convincing people to send money as a

D.   Collecting funds and not delivering the goods

39: The popularity of social networking is increasing most rapidly _____.

A.   Over all ages

B.   Deals or offers

C.   Direct Advertising

D.   Cyberstalking

40: All of the following are true of virus protection software packages except ________.

A.   Identity theft

B.   Non-auction scam

C.   Advance fee fraud

D.   You can only scan the entire computer each time you perform a scan

41: All of the following were top cybercrimes reported to the ic3 in 2013 except ________.

A.   Theft of services

B.   Packet filtering

C.   Encryption virus

D.   Pretexting