Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

D

A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a(n) ____________________.

Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Verified

botnet

The purpose of a(n) ____________________ is to authenticate the identity of an individual or organization.

(Short Answer)
4.8/5
(26)

Discuss online auction fraud.

(Essay)
4.9/5
(48)

Antispam programs are used to detect and remove any viruses or worms that find their way onto your computer.

(True/False)
4.8/5
(39)

____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

(Multiple Choice)
4.9/5
(41)

While two-factor authentication systems are common in the United States, they are not widely used in other countries.

(True/False)
4.8/5
(34)

____ uses a single secret key to both encrypt and decrypt the file or message.

(Multiple Choice)
4.8/5
(40)

The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

(Multiple Choice)
4.9/5
(41)

Many Internet security concerns today can be categorized as cybercrimes.

(True/False)
4.7/5
(43)

Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.

(True/False)
4.8/5
(24)

A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

(Multiple Choice)
4.7/5
(34)

____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

(Multiple Choice)
4.8/5
(36)

It is important to select strong passwords and change them frequently.

(True/False)
4.9/5
(32)

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

(Multiple Choice)
4.9/5
(31)

What is war driving?

(Essay)
4.8/5
(39)

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

(Multiple Choice)
4.7/5
(28)

In spoofing, terrorists launch attacks via the Internet. _________________________

(True/False)
4.9/5
(30)

Information used in identity theft can be obtained by skimming or via social engineering.

(True/False)
4.7/5
(36)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)