Exam 15: Computer Security and Privacy
Exam 1: Introduction to the World of Computers90 Questions
Exam 2: The System Unit: Processing and Memory91 Questions
Exam 3: Storage90 Questions
Exam 4: Input and Output90 Questions
Exam 5: System Software: Operating Systems and Utility91 Questions
Exam 6: Application Software89 Questions
Exam 7: Computer Networks89 Questions
Exam 8: The Internet and the World Wide Web87 Questions
Exam 9: Network and Internet Security90 Questions
Exam 10: Multimedia and the Web79 Questions
Exam 11: E-Commerce88 Questions
Exam 12: Information Systems and System Development75 Questions
Exam 13: Program Development and Programming Languages73 Questions
Exam 14: Databases and Database Management Systems72 Questions
Exam 15: Computer Security and Privacy88 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Acccess and the Environment80 Questions
Select questions type
Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
Free
(True/False)
4.7/5
(32)
Correct Answer:
True
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
B
Some local governments permit searches for property located in that area, such as displaying the owner's name, address, and a link to additional information including property value and tax information.
(True/False)
4.7/5
(36)
To supplement backup procedures, businesses and other organizations should have a(n) ____.
(Multiple Choice)
4.8/5
(30)
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
(True/False)
4.7/5
(37)
Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
(True/False)
4.8/5
(37)
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
(Multiple Choice)
4.9/5
(34)
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.
(Multiple Choice)
4.8/5
(42)
You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.
(True/False)
4.9/5
(34)
Although many of us may prefer not to think about it, ____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.
(Multiple Choice)
4.9/5
(30)
Chain locks can be used to secure computers and other hardware. _________________________
(True/False)
4.8/5
(23)
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________
(True/False)
4.9/5
(27)
By ____________________ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
(Short Answer)
4.8/5
(30)
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting, watermarks, and other difficult-to-reproduce content. _________________________
(True/False)
4.8/5
(39)
A marketing activity that can be considered a privacy risk is ____.
(Multiple Choice)
4.9/5
(41)
A growing illegal use of computer monitoring software is for a hacker to use a(n) ____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.
(Short Answer)
4.8/5
(32)
It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
(True/False)
4.8/5
(34)
Showing 1 - 20 of 88
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)