_______ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
A)...
Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.
Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning...
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
A)...
One form of online vandalism is ________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
One form of online vandalism is ________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization...
With electronic information is stolen, the crime is readily apparent.
With electronic information is stolen, the crime is readily apparent.
A) True
B) False
Answer: ...
When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
When voltage levels lag (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
A) True
B) False
Answer:...
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ________ characters in Internet Explorer 4.0, the browser will crash.
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ________ characters in Internet Explorer...
______ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.
______ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence...
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail.
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail.
A)...
The ________ data file contains the hashed representation of the user's password.
The ________ data file contains the hashed representation of the user's password.
A) SLA
B) SNMP
C) FBI
D) SAM
Answer: ...
The _______ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
The _______ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
A) WWW
B) TCP
C) FTP
D) HTTP
Answer:...
Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas."
Intellectual property is defined as "the creation, ownership, and control of ideas as well as the representation of those ideas."
A) True
B) False
Answer:...
A sniffer program can reveal data transmitted on a network segment including passwords, the embedded and attached files—such as word-processing documents—and sensitive data transmitted to or from applications.
A sniffer program can reveal data transmitted on a network segment including passwords, the embedded and attached files—such as word-processing documents—and...
Attacks conducted by scripts are usually unpredictable.
Attacks conducted by scripts are usually unpredictable.
A) True
B) False
Answer: ...
With the removal of copyright protection mechanisms, software can be easily distributed and installed.
With the removal of copyright protection mechanisms, software can be easily distributed and installed.
A) True
B) False
Answer: ...
A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffers.
A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffers.
A) True
B) False
Answer:...
Two watchdog organizations that investigate allegations of software abuse are SIIA and NSA.
Two watchdog organizations that investigate allegations of software abuse are SIIA and NSA.
A) True
B) False
Answer: ...
A _____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
A _____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
A) denial-of-service
B)...
"4-1-9" fraud is an example of a ____________________ attack.
"4-1-9" fraud is an example of a ____________________ attack.
A) social engineering
B) virus
C) worm
D) spam
Answer: ...
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into...
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
A) WWW
B) TCP
C) FTP
D) HTTP
Answer:...
____ is any technology that aids in gathering information about a person or organization without their knowledge.
____ is any technology that aids in gathering information about a person or organization without their knowledge.
A) A bot
B) Spyware
C) Trojan
D)...
In a ____ attack, the attacker sends a large number of connection or information requests to a target.
In a ____ attack, the attacker sends a large number of connection or information requests to a target.
A) denial-of-service
B) distributed denial-of-service
C)...
Information security safeguards the technology assets in use at the organization.
Information security safeguards the technology assets in use at the organization.
A) True
B) False
Answer: ...
Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.
Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning...
Complete loss of power for a moment is known as a ____.
Complete loss of power for a moment is known as a ____.
A) sag
B) fault
C) brownout
D) blackout
Answer: ...
Attacks conducted by scripts are usually unpredictable.
Attacks conducted by scripts are usually unpredictable.
A) True
B) False
Answer: ...
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure...
The macro virus infects the key operating system files located in a computer's boot sector.
The macro virus infects the key operating system files located in a computer's boot sector.
A) True
B) False
Answer: ...
In a ____ attack, the attacker sends a large number of connection or information requests to a target.
In a ____ attack, the attacker sends a large number of connection or information requests to a target.
A) denial-of-service
B) distributed denial-of-service
C)...
Which of the following is an example of a Trojan horse program?
Which of the following is an example of a Trojan horse program?
A) Netsky
B) MyDoom
C) Klez
D) Happy99.exe
Answer: ...
Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers.
Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers.
A) True
B) False
Answer: ...
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
A) Drones
B) Helpers
C)...
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.
A)...
Packet kiddies use automated exploits to engage in distributed denial-of-service attacks.
Packet kiddies use automated exploits to engage in distributed denial-of-service attacks.
A) True
B) False
Answer: ...
With electronic information is stolen, the crime is readily apparent.
With electronic information is stolen, the crime is readily apparent.
A) True
B) False
Answer: ...
___ are software programs that hide their true nature, and reveal their designed behavior only when activated.
___ are software programs that hide their true nature, and reveal their designed behavior only when activated.
A) Viruses
B) Worms
C) Spam
D) Trojan...
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
A) True
B) False
Answer:...
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker routes large quantities of e-mail to the target.
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker routes large quantities of e-mail to the target.
A)...
Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
A) True
B) False
Answer:...
A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.
A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software...
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
A)...
A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
A) denial-of-service
B)...
A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.
A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.
A) True
B) False
Answer: ...
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization...
Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.
Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.
A) SSL
B) SLA
C) MSL
D) MIN
Answer:...
When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
A) True
B) False
Answer:...
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
A)...
With the removal of copyright protection, software can be easily distributed and installed.
With the removal of copyright protection, software can be easily distributed and installed.
A) True
B) False
Answer: ...
A race condition is a failure of a program that occurs when an unexpected ordering of events in execution of the program results in a conflict over access to the same system resource.
A race condition is a failure of a program that occurs when an unexpected ordering of events in execution of the program results in a conflict over...
Cross-site Scripting(or XSS) occurs when ____.
Cross-site Scripting(or XSS) occurs when ____.
A) developers fail to properly validate user inputbefore using it to query a relational database.
B)...
A buffer overflow is an application error that occurs when more data is sent to a program than it is designed to handle.
A buffer overflow is an application error that occurs when more data is sent to a program than it is designed to handle.
A) True
B) False
Answer:...
A sniffer is a program or device that can monitor data traveling over a network. It is only used to steal information.
A sniffer is a program or device that can monitor data traveling over a network. It is only used to steal information.
A) True
B) False
Answer:...
Which one of the following is NOT a type of password attack?
Which one of the following is NOT a type of password attack?
A) Password Crack
B) Brute force attack
C) Dictionary attack
D) Denial-of-Service (DoS)
Answer:...
Which one of the following is NOT a type of force majeure?
Which one of the following is NOT a type of force majeure?
A) Tsumani
B) Flood
C) Human failure
D) Tornado or severe windstorm
Answer: ...
Why does polymorphism cause greater concern than traditional malware? Choose the best possible answer.
Why does polymorphism cause greater concern than traditional malware? Choose the best possible answer.
A) Because it installs back door cmponent in...
The most common form of violation of intellectual property is sabotage.
The most common form of violation of intellectual property is sabotage.
A) True
B) False
Answer: ...
Dust contamination threat can disrupt normal operations of an information system.
Dust contamination threat can disrupt normal operations of an information system.
A) True
B) False
Answer: ...
Why do employees constitute one of the greatest threats to information security? Choose the best answer.
Why do employees constitute one of the greatest threats to information security? Choose the best answer.
A) Because of incorrect assumptions
B) Because...
Each of the following is a type of malware except _____.
Each of the following is a type of malware except _____.
A) Virus
B) Worm
C) Trojan horse
D) Information Extortion
Answer: ...
________ are masters of several programming languages, networking protocols, and operating systems.
________ are masters of several programming languages, networking protocols, and operating systems.
A) Scprit kiddies
B) Unskilled hackers
C)...
Each of the following is a techniques used in Social Engineering except _____.
Each of the following is a techniques used in Social Engineering except _____.
A) perpetrator pose as a person higher in the organizational hierarchy...
What is Information Extortion?
What is Information Extortion?
A) Deliberate sabotage of a computer system or business
B) Technical hardware failures or errors
C) When an attacker...
Malicious software components performs the following actions against the target systems:
Malicious software components performs the following actions against the target systems:
A) deny service
B) destroy
C) damage
D) all of the above
Answer:...
A worm is a malicious program that replicates itself constantly. It requires another program environment.
A worm is a malicious program that replicates itself constantly. It requires another program environment.
A) True
B) False
Answer: ...
A virus consists of segments of code that performs malicious actions.
A virus consists of segments of code that performs malicious actions.
A) True
B) False
Answer: ...
What is the most import asset of an organization?
What is the most import asset of an organization?
A) Software
B) Data
C) People
D) Hardware
Answer: ...
Information Security is a management problem for which of the following reasons?
Information Security is a management problem for which of the following reasons?
A) It has to do more with policy and its enforcement than with the...
Each of the following is an important function performed by the Information Security except ______________.
Each of the following is an important function performed by the Information Security except ______________.
A) safeguarding the organization's technology...
Pressing and holding _____ when creating a selection removes the selection from the currently selected area.
Pressing and holding _____ when creating a selection removes the selection from the currently selected area.
A) [Tab]
B) [Shift]
C) [Esc]
D) [alt]...
A(n) _____ moves the image up off the page, as though it is floating and casting a shadow on the background.
A(n) _____ moves the image up off the page, as though it is floating and casting a shadow on the background.
A) white border
B) black border
C) drop...
The Puppet Warp is a _____ .
The Puppet Warp is a _____ .
A) 3D effect
B) Filter
C) Layer Style
D) Transform command
Answer: ...
When transforming a graphic, you can press _____ (Mac) to execute the transformation.
When transforming a graphic, you can press _____ (Mac) to execute the transformation.
A) [Tab]
B) [Shift]
C) [option]
D) [return]
Answer: ...
Pressing and holding _____ when creating a selection removes the selection from the currently selected area.
Pressing and holding _____ when creating a selection removes the selection from the currently selected area.
A) [Ctrl]
B) [Shift]
C) [Tab]
D) [Alt](Win)...
In Windows, the shortcut for closing a file is _____ .
In Windows, the shortcut for closing a file is _____ .
A) [Ctrl][O]
B) [Ctrl][A]
C) [Ctrl][C]
D) [Ctrl][W]
Answer: ...
Each time you press an arrow, the images moves _____ pixel(s) in that direction.
Each time you press an arrow, the images moves _____ pixel(s) in that direction.
A) 1
B) 2
C) 5
D) 10
Answer: ...
A(n) _____ moves the image up off the page, as though it is floating and casting a shadow on the background.
A(n) _____ moves the image up off the page, as though it is floating and casting a shadow on the background.
A) white border
B) black border
C) drop...
Pressing _____ (Win) or [option] (Mac) while clicking the Indicates visibility button of the targeted layer hides all other layers.
Pressing _____ (Win) or [option] (Mac) while clicking the Indicates visibility button of the targeted layer hides all other layers.
A) [Ctrl]
B) [Alt]
C)...
The PS(*._____) file format is the "native" format for PS.
The PS(*._____) file format is the "native" format for PS.
A) PSD
B) PICT
C) PDD
D) PSB
Answer: ...
Skyler knows that the keyboard sequence [Shift][Alt][Ctrl][E] on his Windows PC is called Stamp ____.
Skyler knows that the keyboard sequence [Shift][Alt][Ctrl][E] on his Windows PC is called Stamp ____.
A) Number
B) Visible
C) Transition
D)...
It's almost Valentines Day, and Skyler doesn't have enough money to buy the box of candy he had wanted for his girlfriend, Claudette. Skyler is lucky, though, because Claudette is one of those girls who truly believes that it's the thought that counts. He decides that instead of candy, he will use his computer and some graphics applications to make her a special card.Skyler wants the front of the card to have a dramatic, three-dimensional effect. Which of the following layer styles should he use?
It's almost Valentines Day, and Skyler doesn't have enough money to buy the box of candy he had wanted for his girlfriend, Claudette. Skyler is lucky,...
The Revert command is on the ____ menu.
The Revert command is on the ____ menu.
A) File
B) Illustrator
C) Edit
D) Image
Answer: ...
When pasting a selection from Illustrator, if you click the ____ option button, the result of the paste is a bitmap graphic, which is pasted as a new layer.
When pasting a selection from Illustrator, if you click the ____ option button, the result of the paste is a bitmap graphic, which is pasted as a new...
To paste a selection from Illustrator in Photoshop, you should click ____.
To paste a selection from Illustrator in Photoshop, you should click ____.
A) Edit/Paste Special
B) Edit/Paste From Illustrator
C) Edit/Import Selection
D)...
You can press ____ to switch to Full Screen Mode.
You can press ____ to switch to Full Screen Mode.
A) [F]
B) [S]
C) [M]
D) [F9]
Answer: ...
The Save Selection command is available on the ____ menu.
The Save Selection command is available on the ____ menu.
A) File
B) File/Export
C) Edit
D) Select
Answer: ...
The ____ command copies the entire canvas in its current visual status, then creates a new layer with the artwork flattened onto one layer.
The ____ command copies the entire canvas in its current visual status, then creates a new layer with the artwork flattened onto one layer.
A) Print...
To contract a selection, you should click _____ .
To contract a selection, you should click _____ .
A) Select--> Modify
B) Select--> Contract
C) Select--> Modify--> Contract
D) Select-->...
The Chisel Hard Emboss creates a dramatic, ____ effect.
The Chisel Hard Emboss creates a dramatic, ____ effect.
A) motion
B) rotating
C) three-dimensional
D) wood-like
Answer: ...
For some reason, a photo of a Great Northern caboose ended up looking dark purple instead of bright red. He wants to change the color, but he wants the photo to look realistic. What will he need to manipulate in order to make the change?
For some reason, a photo of a Great Northern caboose ended up looking dark purple instead of bright red. He wants to change the color, but he wants...
This month's issue of Choo-Choo: A Magazine for Model Train Enthusiasts was difficult to put together, and it was all because of the photography. It could have been the lighting, the lenses, the camera, or any combination of all three, but the color in every photo was wrong. George, the editor, spent much of the month trying to fix the colors using Photoshop.Which of the following adjustments will George work with in order to alter the hue of the pixels he selected in the cover photograph?
This month's issue of Choo-Choo: A Magazine for Model Train Enthusiasts was difficult to put together, and it was all because of the photography. It...
____ is not a setting available in the Hue/Saturation adjustment.
____ is not a setting available in the Hue/Saturation adjustment.
A) Brightness
B) Saturation
C) Lightness
D) Colorize
Answer: ...
Choosing to ____ artwork converts all the hues to the same hue.
Choosing to ____ artwork converts all the hues to the same hue.
A) colorize
B) posterize
C) saturate
D) invert
Answer: ...
Photoshop's color wheel offers a total of ____ hues.
Photoshop's color wheel offers a total of ____ hues.
A) 128
B) 180
C) 256
D) 360
Answer: ...
To open the Posterize dialog box, click____
To open the Posterize dialog box, click____
A) Image/Mode/Posterize
B) Effect /Posterize
C) Layer /Posterize
D) Image /Adjustments /Posterize
Answer:...
The ____ dialog box is the best feature in Photoshop for exploring the concept of grayscale.
The ____ dialog box is the best feature in Photoshop for exploring the concept of grayscale.
A) Grayscale
B) Posterize
C) Swatches
D) Color...
White pixels have a grayscale value of ____.
White pixels have a grayscale value of ____.
A) 0
B) 15
C) 127
D) 255
Answer: ...
Black pixels have a grayscale value of _____ .
Black pixels have a grayscale value of _____ .
A) 0
B) 15
C) 127
D) 255
Answer: ...
You can use the _____ Tool to scroll around.
You can use the _____ Tool to scroll around.
A) Zoom
B) Move
C) Hand
D) Pen
Answer: ...
While employees were excited to jump right into color adjustment when they got to the guided practice part of Olaf's training, he cautioned them that before considering overall color balance, you should first evaluate the ____ of the image.
While employees were excited to jump right into color adjustment when they got to the guided practice part of Olaf's training, he cautioned them that...
Olaf "Snorri" Torgerson is training new recruits in the color department of an ad agency. Because of the importance of Photoshop in color adjustment, Olaf decides to spend an entire day going over the application's capabilities in that area.Many of the new employees are straight out of college, and Olaf knows that while they may understand the basics of Photoshop, only ____ will help them to truly master the use of curves in color adjustment.
Olaf "Snorri" Torgerson is training new recruits in the color department of an ad agency. Because of the importance of Photoshop in color adjustment,...
In RGB mode there are over ____ colors.
In RGB mode there are over ____ colors.
A) 16 million
B) 512
C) 65536
D) 256
Answer: ...
In the Properties panel for a Curves adjustment, an Output value of ____ means that all the black pixels are white.
In the Properties panel for a Curves adjustment, an Output value of ____ means that all the black pixels are white.
A) 0
B) 127
C) 360
D) 255
Answer:...
According to the terminology suggested in the text, what is the term for the whitest area of a black-and-white image?
According to the terminology suggested in the text, what is the term for the whitest area of a black-and-white image?
A) Bright point
B) White areas
C)...
When sampling for highlights, you should not sample the white circles that usually appear in the center of a subject's eyes because ____.
When sampling for highlights, you should not sample the white circles that usually appear in the center of a subject's eyes because ____.
A)...
In Grayscale mode there are ____ colors available in total.
In Grayscale mode there are ____ colors available in total.
A) 2
B) 16
C) 128
D) 256
Answer: ...
The Invert command can be found on the ____ menu.
The Invert command can be found on the ____ menu.
A) Image/Adjustments
B) Image
C) Edit
D) Layer
Answer: ...
Black pixels have a grayscale value of ____.
Black pixels have a grayscale value of ____.
A) 0
B) 63
C) 127
D) 255
Answer: ...
To posterize an image, click ____.
To posterize an image, click ____.
A) Effect/Posterize
B) Layer/Adjustments/Posterize
C) Image/Posterize
D) Image/Adjustments /Posterize
Answer:...
Hans needs to create a special texture for the Roman numerals in order to replicate the German-Style Round clock face template. He must add noise to the type he has already created. Which of the following will allow him to add noise?
Hans needs to create a special texture for the Roman numerals in order to replicate the German-Style Round clock face template. He must add noise to...
Hans has taken over the family clock-making business, and wants to change a few things in order to increase productivity. In order to duplicate the company's signature clock faces accurately, Hans will need to become quite familiar with PS's abilities to change the appearance of type face on a document.Many of the clock faces use stately Roman numerals to represent the hours. Which of the following might Hans use in replicating them in his new PS documents?
Hans has taken over the family clock-making business, and wants to change a few things in order to increase productivity. In order to duplicate the...
To rotate a path 180 degrees, click ____.
To rotate a path 180 degrees, click ____.
A) Edit, Transform Path, then Rotate 180
B) Image, Transform Path, then Rotate 180
C) Layer, Transform Path,...
The ____ blending mode doesn't alter the hue or the saturation of the pixels below, only the brightness.
The ____ blending mode doesn't alter the hue or the saturation of the pixels below, only the brightness.
A) Soft Light
B) Hard Light
C) Lighten
D)...
_____ is not a setting of the Plastic Wrap filter.
_____ is not a setting of the Plastic Wrap filter.
A) Highlight strength
B) Detail
C) Lightness
D) Smoothness
Answer: ...
The Select All - Copy Merged - Paste sequence yields the same result as the ____ command.
The Select All - Copy Merged - Paste sequence yields the same result as the ____ command.
A) Stamp Visible
B) Flatten Image
C) Merge Visible Layers
D)...
____ type is unusual and not regularly seen.
____ type is unusual and not regularly seen.
A) Plastic
B) Chiseled
C) Serif
D) Sans-serif
Answer: ...
To apply a motion blur to an image, click ____.
To apply a motion blur to an image, click ____.
A) Image, then Blur
B) Filter, then Motion Blur
C) Filter, then Blur
D) Filter, Blur, then Motion...
In a Chisel Hard effect, the ____ slider increases or decreases the chisel effect.
In a Chisel Hard effect, the ____ slider increases or decreases the chisel effect.
A) Size
B) Contrast
C) Brightness
D) Depth
Answer: ...
_____ is a Serif type face.
_____ is a Serif type face.
A) Arial
B) Verdana
C) Century Old Style
D) Tahoma
Answer: ...
____ is one of the Gloss Contour choices that can be selected in the Layer Style dialog box.
____ is one of the Gloss Contour choices that can be selected in the Layer Style dialog box.
A) Plastic
B) Ring
C) Golden
D) Angel
Answer:...
Hue/Saturation is a type of ____.
Hue/Saturation is a type of ____.
A) filter
B) adjustment layer
C) alteration
D) blending mode
Answer: ...
____ is one of the blending modes supported in Photoshop.
_____ is one of the blending modes supported in Photoshop.
A) Hue/Saturation
B) Transparent
C) Hard Light
D) Underlay
Answer: ...
____ is one of the blending modes available in Photoshop.
____ is one of the blending modes available in Photoshop.
A) regular
B) Screen
C) Additive
D) Dodge
Answer: ...
A risk is the likelihood of a threat source taking advantage of a vulnerability to an information system. Risks left over after implementing safeguards is known as:
A risk is the likelihood of a threat source taking advantage of a vulnerability to an information system. Risks left over after implementing safeguards...
You can specify color settings for all Create Suite applications in
You can specify color settings for all Create Suite applications in
Answer: Adobe Brid...
The easiest way to select and apply filters is to use the
The easiest way to select and apply filters is to use the
Answer: Filters Galle...
Which of the following is one of Photoshop's blending modes?
Which of the following is one of Photoshop's blending modes?
Answer: multip...
To reshape a path, use the
To reshape a path, use the
Answer: Direct Selection to...
If a document you are preparing for Web use contains a photo image, you should optimize the image as a
If a document you are preparing for Web use contains a photo image, you should optimize the image as a
Answer: JP...
To modify settings for an image that will be part of a Web page, first click
To modify settings for an image that will be part of a Web page, first click
Answer: Save for Web & Devices on the File me...
To avoid necessity of rasterizing text, you can use a(n)
To avoid necessity of rasterizing text, you can use a(n)
Answer: Type Mask to...
You can use the Masks panel to
You can use the Masks panel to
Answer: adjust mask density, apply a new mask, and invert a ma...
Before you can apply a Smart Filter, you must convert a layer to a
Before you can apply a Smart Filter, you must convert a layer to a
Answer: Smart Obje...
To add a quick mask, you paint with
To add a quick mask, you paint with
Answer: the foreground col...
To replace a selected area of an image with pixels from the surrounding area, use
To replace a selected area of an image with pixels from the surrounding area, use
Answer: content--aware fi...
To minimize the amount of color clipping that occurs as you increase saturation, apply a(n)
To minimize the amount of color clipping that occurs as you increase saturation, apply a(n)
Answer: Vibrance adjustment lay...
If you want to protect an area of an image before using content-aware scaling, you
If you want to protect an area of an image before using content-aware scaling, you
Answer: use a selection marquee to select the area and then save...
If you decrease the document size with resampling turned off,
If you decrease the document size with resampling turned off,
Answer: resolution increas...
To correct color balance and temperature, a designer can apply a(n)
To correct color balance and temperature, a designer can apply a(n)
Answer: photo filt...
The flaw that occurs when a camera's flash bounces off the retina is
The flaw that occurs when a camera's flash bounces off the retina is
Answer: red e...
To set up five different locations for sampling, use the
To set up five different locations for sampling, use the
Answer: Clone Source pan...
An image can look "posterized" if
An image can look "posterized" if
contrast is too hi...
To distort and reposition content as of running your fingers through a puddle of paint, use the
To distort and reposition content as of running your fingers through a puddle of paint, use the
Answer: Smudge to...
In general, the best option for modifying image appearance is to
In general, the best option for modifying image appearance is to
Answer: apply an adjustment lay...
The Paths drawing mode creates
The Paths drawing mode creates
Answer: vector pa...
To enable the Magic Wand tool to select more or fewer pixels, adjust its
To enable the Magic Wand tool to select more or fewer pixels, adjust its
Answer: toleran...
If you need to select an area that has strong edges or a uniform color, the easiest tool to use is the
If you need to select an area that has strong edges or a uniform color, the easiest tool to use is the
Answer: Quick Selection to...
The color typically applies to a new drawing content is the
The color typically applies to a new drawing content is the
Answer: foreground color
...
To add a predrawn shape such as a paw print or butterfly, use the
To add a predrawn shape such as a paw print or butterfly, use the
Answer: Custom Shape tool
...
The Brush and Pencil tools create
The Brush and Pencil tools create
Answer: raster shap...
To remove pixels to transparency on any layer, use the
To remove pixels to transparency on any layer, use the
Answer: Background Eraser To...
To apply color to the canvas as if working with wet paint, use the
To apply color to the canvas as if working with wet paint, use the
Answer: Mixer Bru...
By default, all new layers are
By default, all new layers are
Answer: transpare...
If a selection marquee is not right where you want it
If a selection marquee is not right where you want it
Answer: you can drag the marquee to a new positi...
Open the preferences dialog box from the
Open the preferences dialog box from the
Answer: edit me...
To restore a floating panel to its group, drag it back on top of the group until you see
To restore a floating panel to its group, drag it back on top of the group until you see
Answer: a heavy blue border around the gro...
To select a different default arrangement of panels, use the
To select a different default arrangement of panels, use the
Answer: workspace switch...
You can display a document at 100% size by
You can display a document at 100% size by
Answer: double-clicking the Zoom to...
Which menu can be found in all Create Suite applications?
Which menu can be found in all Create Suite applications?
Answer: ed...
To change the display of open documents, use the
To change the display of open documents, use the
Answer: arrange documents butt...
You can use the online help and support site to
You can use the online help and support site to
Answer: search for help on a specific feature, participate in an application's forum, and browse through...
The keystroke you use to throw away current settings for an application are
The keystroke you use to throw away current settings for an application are
Answer: Ctrl+Shift+A...
If a panel displays double triangles to the left of the panel name, you can
If a panel displays double triangles to the left of the panel name, you can
Answer: click the triangles to cycle through different panel siz...
The CS5 application display open documents as
The CS5 application display open documents as
Answer: tabbed document windo...
___ triggers(s) specified styles when a device's capabilities match certain criteria.
___ triggers(s) specified styles when a device's capabilities match certain criteria.
Answer: Media querie...
In web design, a style is also known as a(n) _____ .
In web design, a style is also known as a(n) _____ .
Answer: ru...
____ is an Edge Web Fonts font group.
____ is an Edge Web Fonts font group.
Answer: All of the abo...
By default, DW templates contain the following editable regions _____ .
By default, DW templates contain the following editable regions _____ .
Answer: DW creates no editable regions by defau...
RBG values consist of three numbers ranging from _____ to _____ .
RBG values consist of three numbers ranging from _____ to _____ .
Answer: 0, 2...
Complete saturation of light is represented in the hexadecimal color value #FFFFFF, which is the color _____ .
Complete saturation of light is represented in the hexadecimal color value #FFFFFF, which is the color _____ .
Answer: whi...
The CSS _____ property is the space around the element, outside its border.
The CSS _____ property is the space around the element, outside its border.
Answer: marg...
The DW fluid grid layout template actually provides _____ layouts.
The DW fluid grid layout template actually provides _____ layouts.
Answer: thr...
A(n) _____ selector applies styles to a specific item on a webpage, such as a list item.
A(n) _____ selector applies styles to a specific item on a webpage, such as a list item.
Answer: cla...
The _____ is an international community where member organizations, staff, and the public work together to develop web standards.
The _____ is an international community where member organizations, staff, and the public work together to develop web standards.
Answer: W...
Molly knows that the Overlay blending mode is important because it makes _____ transparent.
Molly knows that the Overlay blending mode is important because it makes _____ transparent.
A) white
B) black
C) dark colors
D) neutral gray
Answer:...
Molly wants Trandow's photo to appear slightly in front of the choir, but when she layers the images, the result looks very flat. In order to create depth and dimension, Molly needs to create a _____ between the two images.
Molly wants Trandow's photo to appear slightly in front of the choir, but when she layers the images, the result looks very flat. In order to create...
Soft Light is much more like the _____ mode than the Hard Light mode.
Soft Light is much more like the _____ mode than the Hard Light mode.
A) Multiply
B) Overlay
C) Screen
D) Color
Answer: ...
___ mode is a lightener - whenever you apply it, the active layer lightens the artwork on the canvas.
___ mode is a lightener - whenever you apply it, the active layer lightens the artwork on the canvas.
A) Screen
B) Multiply
C) Overlay
D) Hard Light
Answer:...
In the Overlay blending mode, shadows _____ .
In the Overlay blending mode, shadows _____ .
A) become transparent
B) get darker
C) get lighter
D) intensify
Answer: ...
The Add layer mask button appears on the _____ panel.
The Add layer mask button appears on the _____ panel.
A) Layers
B) Swatches
C) Actions
D) History
Answer: ...
The Clouds filter is a _____ filter.
The Clouds filter is a _____ filter.
A) predictive
B) random
C) mathematical
D) blur
Answer: ...
The _____ blending mode is unpredictable because the resulting effect changes dramatically depending on the color of those layers beneath.
The _____ blending mode is unpredictable because the resulting effect changes dramatically depending on the color of those layers beneath.
A) Overlay
B)...
If the color of an image is too intense, that tells you to reduce _____ .
If the color of an image is too intense, that tells you to reduce _____ .
A) brightness
B) saturation
C) hue
D) contrast
Answer: ...
When working in a photo montage, positioning the images against a _____ background is very useful to see if the shadows are weak or strong.
When working in a photo montage, positioning the images against a _____ background is very useful to see if the shadows are weak or strong.
A) black
B)...
The lead singer of the band, Max Power, has always been the focus of Big Soup. Chaz decides that he wants to add color to Max's image in the photo negative. What should he use?
The lead singer of the band, Max Power, has always been the focus of Big Soup. Chaz decides that he wants to add color to Max's image in the photo negative....
The title of the new album is Negativity Scene. Chaz wants to make the photo of the band look like a photo negative. Which of the following effects should he use to achieve the effect he wants?
Art Woofer, the head of the graphic arts department for EarDrum Records contacted Chaz and told him that the company's most popular act, Big Soup, was...
When creating a ripped effect, you would use a _____ Blur in the Smart Sharpen dialog box if you want to sharpen the fine detail in the grains of paper in the ripped edge.
When creating a ripped effect, you would use a _____ Blur in the Smart Sharpen dialog box if you want to sharpen the fine detail in the grains of paper...
___ is not one of the settings of the Brush tool.
_____ is not one of the settings of the Brush tool.
A) Max. Radius
B) Opacity
C) Flow
D) Radius
Answer: ...
____ is one of the settings that can be modified in the Fill Path dialog box.
____ is one of the settings that can be modified in the Fill Path dialog box.
A) Opacity
B) Max. Radius
C) Tolerance
D) Horizontal
Answer:...
____ is not one of the settings that can be modified in the Fill Path dialog box.
____ is not one of the settings that can be modified in the Fill Path dialog box.
A) Feather Radius
B) Max. Radius
C) Mode
D) Opacity
Answer:...
The Inverse command appears under the _____ menu.
The Inverse command appears under the _____ menu.
A) Edit
B) Layer
C) Effect
D) Select
Answer: ...
The Mezzotint filter appears under the _____ submenu of the Filter menu.
The Mezzotint filter appears under the _____ submenu of the Filter menu.
A) Artistic
B) Stylize
C) Pixelate
D) Render
Answer: ...
Converting an image to ____ mode, and then back to RGB Color mode, is a standard method for working with a black-and-white image in a color mode.
Converting an image to ____ mode, and then back to RGB Color mode, is a standard method for working with a black-and-white image in a color mode.
A)...
You can use the _____ dialog box to reproduce the Solarize filter's effect or to create your own solarize effect.
You can use the _____ dialog box to reproduce the Solarize filter's effect or to create your own solarize effect.
A) Levels
B) Curves
C) Hue/Saturation
D)...
Nadia is a model who recently turned 35. For her most recent shoot, an ad for a calcium supplement for women, Adrian Wapcaplett, will retouch the image to fix some flaws.
Nadia is a model who recently turned 35. For her most recent shoot, an ad for a calcium supplement for women, Adrian Wapcaplett, will retouch the image...
Which of the following is not a setting of the Clone Stamp tool?
Which of the following is not a setting of the Clone Stamp tool?
A) Mode
B) Opacity
C) Flow
D) Fuzziness
Answer: ...
The Patch tool works like the Healing Brush tool, but with the added benefit of a(n) ____.
The Patch tool works like the Healing Brush tool, but with the added benefit of a(n) ____.
A) more sensitive touch
B) wider color range
C) Undo...
The Fill command is under the ____ menu.
The Fill command is under the ____ menu.
A) Effect
B) Layer
C) Edit
D) Image
Answer: ...
The icon of the Healing Brush tool is a ____.
The icon of the Healing Brush tool is a ____.
A) Brush
B) Band-Aid
C) Stamp
D) Patch
Answer: B
...
The Healing Brush tool clones just like the ____ tool.
The Healing Brush tool clones just like the ____ tool.
A) Patch
B) Clone Patch
C) Clone Stamp
D) Stamp Patch
Answer: ...
With the ____ blending mode, you are quite literally painting with light.
With the ____ blending mode, you are quite literally painting with light.
A) Normal
B) Overlay
C) Multiply
D) Screen
Answer: ...
With the Overlay blending mode, neutral gray becomes ____.
With the Overlay blending mode, neutral gray becomes ____.
A) light gray
B) dark gray
C) white
D) Transparent
Answer: ...
___ is one of the most practical and powerful of the blending modes, one you use for retouching, for enhancing an image, and for producing special effects.
___ is one of the most practical and powerful of the blending modes, one you use for retouching, for enhancing an image, and for producing special effects.
A)...
Emily works in the advertising department of the local newspaper as a layout artist. John's IPA is the main grocery store in town, and his ad takes the entire back page of the paper. Unfortunately, John does not understand computers at all, and Emily faces various production challenges every week while trying to get his ad finished before deadline
Emily works in the advertising department of the local newspaper as a layout artist. John's IPA is the main grocery store in town, and his ad takes the...
You can add noise to an image by clicking Filter on the Application bar, pointing to ____, and clicking Add Noise.
You can add noise to an image by clicking Filter on the Application bar, pointing to ____, and clicking Add Noise.
A) Texture
B) Noise
C) Other
D)...
High-resolution images are images that are ____ pixels per inch or more.
High-resolution images are images that are ____ pixels per inch or more.
A) 150
B) 250
C) 300
D) 350
Answer: ...
When enlarging an image, Photoshop creates the additional pixel data based on the existing data, a process referred to as ____.
When enlarging an image, Photoshop creates the additional pixel data based on the existing data, a process referred to as ____.
A) expansion
B) interpolation
C)...
The Unsharp Mask filter creates the illusion of sharpness by increasing the contrast at the image's ____.
The Unsharp Mask filter creates the illusion of sharpness by increasing the contrast at the image's ____.
A) bottom part
B) top part
C) edges
D)...
A reproduction is always ____ an original.
A reproduction is always ____ an original.
A) inferior to
B) superior to
C) brighter than
D) equal to
Answer: ...
____ is one of the possible layer blending modes.
____ is one of the possible layer blending modes.
A) Smart
B) Multiply
C) Factory
D) Inverse
Answer: ...
You can use the ____ mode to create a variety of grayscale images.
You can use the ____ mode to create a variety of grayscale images.
A) Grayscale
B) Lab Color
C) Black-and-White Color
D) Non Color
Answer:...
When a duplicate image is inverted and layered over its duplicate at 50%, the resulting image must be an entirely ____ canvas.
When a duplicate image is inverted and layered over its duplicate at 50%, the resulting image must be an entirely ____ canvas.
A) yellow
B) red
C)...
In Windows, you can press and hold ____ and then click the Layer thumbnail on a layer to load its selection.
In Windows, you can press and hold ____ and then click the Layer thumbnail on a layer to load its selection.
A) [Shift]
B) [Alt]
C) [Ctrl]
D) [Ctrl][Shift]
Answer:...
___ is one of the Gloss Contour choices that can be selected in the Layer Style dialog box.
___ is one of the Gloss Contour choices that can be selected in the Layer Style dialog box.
A) Plastic
B) Ring
C) Golden
D) Angel
Answer:...
To apply a lens flare, click _____ .
To apply a lens flare, click _____ .
A) Filter then Lens Flare
B) Filter, Flare, the Lens
C) Filter, Render, then Lens Flare
D) Filter, Photography,...
Hue/Saturation is a type of ____.
Hue/Saturation is a type of ____.
A) filter
B) adjustment layer
C) alteration
D) blending mode
Answer: ...
____ is one of the blending modes supported in Photoshop.
____ is one of the blending modes supported in Photoshop.
A) Hue/Saturation
B) Transparent
C) Hard Light
D) Underlay
Answer: ...
You can press _____ to switch foreground and background colors.
You can press _____ to switch foreground and background colors.
A) [X]
B) [W]
C) [Tab]
D) [S]
Answer: A
...
When using the ____ blending mode, pixels retain their color, but they become completely transparent and therefore blend with the pixels of images behind them.
When using the ____ blending mode, pixels retain their color, but they become completely transparent and therefore blend with the pixels of images behind...
In Windows, when any selection is loaded, pressing and holding ____, and then clicking the Add layer mask button creates a layer mask in which the selected pixels are filled with black.
In Windows, when any selection is loaded, pressing and holding ____, and then clicking the Add layer mask button creates a layer mask in which the selected...
To navigate between text boxes in the Options bar, you can press ____.
To navigate between text boxes in the Options bar, you can press ____.
A) [Alt]
B) [Shift]
C) [Spacebar]
D) [Tab]
Answer: ...
____ is one of the blending modes available in Photoshop.
____ is one of the blending modes available in Photoshop.
A) regular
B) Screen
C) Additive
D) Dodge
Answer: ...
Subscribe to:
Posts (Atom)