Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

  -As shown in the accompanying figure, a(n) ____________________ app can lock and unlock your computer automatically as your iPhone moves in and out of range. -As shown in the accompanying figure, a(n) ____________________ app can lock and unlock your computer automatically as your iPhone moves in and out of range.

(Short Answer)
4.9/5
(40)

The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.

(Multiple Choice)
4.8/5
(35)

By ____, you instruct companies you do business with that they cannot share your personal data with third parties.

(Multiple Choice)
4.8/5
(30)

____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.

(Multiple Choice)
4.9/5
(36)

When spam is sent via IM it is called ____.

(Multiple Choice)
4.8/5
(34)

There are many options for protecting yourself against computer monitoring by your employer or the government.

(True/False)
4.9/5
(43)

The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________

(True/False)
4.8/5
(44)

____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.

(Multiple Choice)
4.7/5
(42)

Our networked society has raised a number of ____ concerns.

(Multiple Choice)
4.9/5
(39)

The disaster recovery plan is also called a business continuity plan.

(True/False)
4.7/5
(25)

____________________ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.

(Short Answer)
4.8/5
(29)

For users who need more protection than a protective case can provide, ____________________ devices (such as portable computers and mobile phones) are available.

(Short Answer)
4.8/5
(42)

Discuss the proper disposal of hardware containing sensitive information.

(Essay)
4.9/5
(39)

New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.

(Multiple Choice)
4.7/5
(38)

____________________ labels change their appearance if someone (such as a thief) tries to remove them.

(Short Answer)
4.9/5
(37)

One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer ____________________ software.

(Short Answer)
4.8/5
(40)

At the present time, opting-out procedures are confusing and time-consuming, and they do not always work well.

(True/False)
4.8/5
(22)

Computer monitoring programs can keep a log of all computer keystrokes performed on a computer, record the activities taking place, take screen shots of the screen at specified intervals, and more. _________________________

(True/False)
4.8/5
(33)

____ refers to companies recording or observing the actions of employees while on the job.

(Multiple Choice)
4.8/5
(34)

To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)