Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Phish refers to unsolicited e-mail sent to a large group of individuals at one time.

(True/False)
4.7/5
(37)

To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers) that cannot afford to be without power for any period of time, generators can be used. _________________________

(True/False)
4.8/5
(32)

Information such as birth records, marriage certificates, and divorce information, as well as property purchases, assessments, liens, and tax values is confidential and can legally be seen only by authorized individuals.

(True/False)
4.8/5
(30)

To protect hardware from damage due to power fluctuations, it is important for all users to use a surge ____________________ with a computer whenever it is plugged into a power outlet.

(Short Answer)
4.8/5
(39)

Spam sent via IM is called sim. _________________________

(True/False)
4.8/5
(37)

____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

(Multiple Choice)
4.8/5
(36)

C-level attacks can occur because of a natural disaster (such as a tornado, fire, flood, or hurricane), sabotage, or terrorist attack. _________________________

(True/False)
4.8/5
(41)

One of the most obvious types of hardware loss is hardware theft. _________________________

(True/False)
4.7/5
(36)
Showing 81 - 88 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)