Exam 9: Network and Internet Security
Exam 1: Introduction to the World of Computers90 Questions
Exam 2: The System Unit: Processing and Memory91 Questions
Exam 3: Storage90 Questions
Exam 4: Input and Output90 Questions
Exam 5: System Software: Operating Systems and Utility91 Questions
Exam 6: Application Software89 Questions
Exam 7: Computer Networks89 Questions
Exam 8: The Internet and the World Wide Web87 Questions
Exam 9: Network and Internet Security90 Questions
Exam 10: Multimedia and the Web79 Questions
Exam 11: E-Commerce88 Questions
Exam 12: Information Systems and System Development75 Questions
Exam 13: Program Development and Programming Languages73 Questions
Exam 14: Databases and Database Management Systems72 Questions
Exam 15: Computer Security and Privacy88 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Acccess and the Environment80 Questions
Select questions type
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
(Multiple Choice)
4.9/5
(26)
A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n) ____________________.
(Short Answer)
4.9/5
(34)
Public key encryption is also called ____________________ encryption.
(Short Answer)
4.7/5
(33)
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
(Multiple Choice)
4.8/5
(44)
Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.
(Multiple Choice)
4.9/5
(38)
Strong passwords are passwords that are at least eight characters long. _________________________
(True/False)
4.8/5
(27)
A relatively new type of scam involves posting fake job listings on job search sites to elicit personal information (such as Social Security numbers) from job seekers.
(True/False)
4.8/5
(40)
____ is a generic term that refers to any type of malicious software.
(Multiple Choice)
4.8/5
(42)
Typically, ____________________ begins with obtaining a person's name and Social Security number, often from a credit application, rental application, or similar form.
(Short Answer)
4.8/5
(34)
____ software can control which devices can be connected to an employee's computer.
(Multiple Choice)
4.9/5
(31)
To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.
(Short Answer)
4.7/5
(38)
Like a computer virus, a computer worm infects other computer files to replicate itself.
(True/False)
4.8/5
(28)
Computer spyware includes any illegal act involving a computer. _________________________
(True/False)
4.9/5
(29)
Once installed, ____________________ are designed to record every keystroke made on the infected computer and transmit account numbers, passwords, and other related information to criminals.
(Essay)
4.9/5
(27)
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
(True/False)
4.8/5
(33)
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
(Multiple Choice)
4.7/5
(33)
One emerging type of Trojan horse is called a ____-Access Trojan.
(Multiple Choice)
4.8/5
(33)
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)