Exam 9: Network and Internet Security
Exam 1: Introduction to the World of Computers90 Questions
Exam 2: The System Unit: Processing and Memory91 Questions
Exam 3: Storage90 Questions
Exam 4: Input and Output90 Questions
Exam 5: System Software: Operating Systems and Utility91 Questions
Exam 6: Application Software89 Questions
Exam 7: Computer Networks89 Questions
Exam 8: The Internet and the World Wide Web87 Questions
Exam 9: Network and Internet Security90 Questions
Exam 10: Multimedia and the Web79 Questions
Exam 11: E-Commerce88 Questions
Exam 12: Information Systems and System Development75 Questions
Exam 13: Program Development and Programming Languages73 Questions
Exam 14: Databases and Database Management Systems72 Questions
Exam 15: Computer Security and Privacy88 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Acccess and the Environment80 Questions
Select questions type
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
D
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a(n) ____________________.
Free
(Short Answer)
4.9/5
(34)
Correct Answer:
botnet
The purpose of a(n) ____________________ is to authenticate the identity of an individual or organization.
(Short Answer)
4.8/5
(26)
Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.
(True/False)
4.8/5
(39)
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.
(Multiple Choice)
4.9/5
(41)
While two-factor authentication systems are common in the United States, they are not widely used in other countries.
(True/False)
4.8/5
(34)
____ uses a single secret key to both encrypt and decrypt the file or message.
(Multiple Choice)
4.8/5
(40)
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
(Multiple Choice)
4.9/5
(41)
Many Internet security concerns today can be categorized as cybercrimes.
(True/False)
4.7/5
(43)
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
(True/False)
4.8/5
(24)
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
(Multiple Choice)
4.7/5
(34)
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
(Multiple Choice)
4.8/5
(36)
It is important to select strong passwords and change them frequently.
(True/False)
4.9/5
(32)
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
(Multiple Choice)
4.9/5
(31)
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
(Multiple Choice)
4.7/5
(28)
In spoofing, terrorists launch attacks via the Internet. _________________________
(True/False)
4.9/5
(30)
Information used in identity theft can be obtained by skimming or via social engineering.
(True/False)
4.7/5
(36)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)