Exam 10: Security and Privacy in an Electronic Age

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

________ is the scrambling of data so that it does not make sense.

Free
(Short Answer)
4.8/5
(29)
Correct Answer:
Verified

Encryption

Privacy includes the right to ________.

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

A

A ________ is a program that attaches itself to another program and replicates itself. It may do damage to your hardware or destroy your data.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

virus

________ are small files that a website may put on your hard drive when you visit.

(Short Answer)
4.8/5
(34)

Electronic blocks (called ________) can be used to limit access to networks.

(Short Answer)
4.8/5
(33)

The ________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

(Multiple Choice)
4.7/5
(29)

The first federal legislation protecting the privacy of medical records is ________.

(Short Answer)
4.8/5
(36)

A ________ can connect the user with numbers without the user's knowledge; the dialer may connect the user's computer to an expensive 900 number.

(Short Answer)
4.7/5
(40)

________ involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator. The user is directed to a fake website and asked to enter information.

(Short Answer)
4.9/5
(30)

The unauthorized copying of software protected by copyright is a crime called ________.

(Multiple Choice)
4.8/5
(37)

Under the ________ part of the American Recovery and Reinvestment Act of 2009, the privacy protections of HIPAA are strengthened and expanded significantly to, for example, businesses who work with your health care provider.

(Multiple Choice)
4.8/5
(37)

The ________ gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.

(Multiple Choice)
4.8/5
(27)

A ________ is a program that attaches itself to another program and replicates itself.

(Multiple Choice)
4.9/5
(27)

________ is the unauthorized copying of software protected by copyright.

(Short Answer)
4.9/5
(39)

________ is software that can be installed without the user's knowledge to track their actions on a computer.

(Multiple Choice)
4.8/5
(36)

The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ________ Act.

(Short Answer)
4.8/5
(33)

________ has many aspects. Among them is the ability to control personal information and the right to keep it from misuse.

(Short Answer)
4.8/5
(31)

The ________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.

(Short Answer)
4.8/5
(30)

________ theft involves someone using someone's private information to assume his or her identity.

(Multiple Choice)
4.8/5
(36)

The ________ has been interpreted to allow employers access to employees' e-mail.

(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)