Exam 7: Computer and Network Security
Exam 1: Catalysts for Chang67 Questions
Exam 2: Introduction to Ethics50 Questions
Exam 3: Networked Communications38 Questions
Exam 4: Intellectual Property44 Questions
Exam 5: Information Privacy24 Questions
Exam 6: Privacy and the Government38 Questions
Exam 7: Computer and Network Security19 Questions
Exam 8: Computer Reliability27 Questions
Exam 9: Professional Ethics17 Questions
Exam 10: Work and Wealth27 Questions
Select questions type
A self-contained program that spreads through a computer network by exploiting security holes is called a
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
E
Vote-counting irregularities in the State of________ in the 2000 U.S. Presidential election led to more interest in computerized voting systems.
(Short Answer)
4.8/5
(31)
According to some estimates, 90 percent of spam is distributed through________ networks.
(Short Answer)
4.8/5
(34)
An intentional action designed to prevent legitimate users from making use of a computer service is called a________ .
(Short Answer)
5.0/5
(39)
A program with a benign capability that conceals another, sinister purpose is called a
(Multiple Choice)
4.9/5
(40)
A ________is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
(Short Answer)
4.8/5
(41)
The manipulation of a person inside an organization to gain access to confidential information is called ________.
(Short Answer)
4.9/5
(35)
A ________is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.
(Short Answer)
4.7/5
(33)
An intentional action designed to prevent legitimate users from making use of a computer service is called
(Multiple Choice)
4.9/5
(30)
A software program that responds to commands sent by a command-and-control program located on an external computer is called a
(Multiple Choice)
4.7/5
(31)
The________ criminalizes a wide variety of hacker-related activities.
(Short Answer)
4.9/5
(34)
A ________is a piece of self-replicating code embedded within another program called the host.
(Short Answer)
4.9/5
(49)
Manipulating someone within an organization to gain access to confidential information is called
(Multiple Choice)
4.9/5
(41)
A piece of self-replicating code embedded within another program is called a
(Multiple Choice)
4.7/5
(33)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)