Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The best protection against many dot cons is ____.

(Multiple Choice)
4.9/5
(33)

A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

(Multiple Choice)
4.9/5
(26)

A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n) ____________________.

(Short Answer)
4.9/5
(34)

Public key encryption is also called ____________________ encryption.

(Short Answer)
4.7/5
(33)

A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

(Multiple Choice)
4.8/5
(44)

Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.

(Multiple Choice)
4.9/5
(38)

Strong passwords are passwords that are at least eight characters long. _________________________

(True/False)
4.8/5
(27)

A relatively new type of scam involves posting fake job listings on job search sites to elicit personal information (such as Social Security numbers) from job seekers.

(True/False)
4.8/5
(40)

____ is a generic term that refers to any type of malicious software.

(Multiple Choice)
4.8/5
(42)

Typically, ____________________ begins with obtaining a person's name and Social Security number, often from a credit application, rental application, or similar form.

(Short Answer)
4.8/5
(34)

____ software can control which devices can be connected to an employee's computer.

(Multiple Choice)
4.9/5
(31)

To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.

(Short Answer)
4.7/5
(38)

Like a computer virus, a computer worm infects other computer files to replicate itself.

(True/False)
4.8/5
(28)

Computer crime is sometimes referred to as ____.

(Multiple Choice)
4.8/5
(39)

Computer spyware includes any illegal act involving a computer. _________________________

(True/False)
4.9/5
(29)

Once installed, ____________________ are designed to record every keystroke made on the infected computer and transmit account numbers, passwords, and other related information to criminals.

(Essay)
4.9/5
(27)

Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.

(True/False)
4.8/5
(33)

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

(Multiple Choice)
4.7/5
(33)

One emerging type of Trojan horse is called a ____-Access Trojan.

(Multiple Choice)
4.8/5
(33)

____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)