Exam 11: Computer Security and Safety, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following, or programs that act without a user's knowledge and deliberately alter the computer's operations?

(Multiple Choice)
4.9/5
(33)

Spim are messages like those in the accompanying figure, but sent via VoIP.

(True/False)
4.9/5
(27)

COGNITIVE ASSESSMENT Which vendor is the world's largest dedicated security technology company?

(Multiple Choice)
4.8/5
(25)

COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?

(Multiple Choice)
4.9/5
(43)

Discuss S-HTTP and VPNs.

(Essay)
4.9/5
(39)

Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer.

(True/False)
4.9/5
(32)

COGNITIVE ASSESSMENT What is the problem with the Fair Credit Reporting Act?

(Multiple Choice)
4.7/5
(35)

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

(Not Answered)
This question doesn't have any answer yet
Ask our community

A(n) ____________________ is a separate area of a hard disk that holds an infected file until the infection can be removed.

(Short Answer)
4.8/5
(41)

COGNITIVE ASSESSMENT Define the term firewall.

(Multiple Choice)
4.8/5
(34)

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

(Multiple Choice)
4.7/5
(39)

A surge protector absorbs small overvoltages - generally without damage to the computer or equipment.

(True/False)
4.9/5
(38)

To utilize intrusion detection software requires little expertise because the programs--which automatically analyzes network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches--are simple and easy to use and interpret.

(True/False)
4.7/5
(35)

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

(Multiple Choice)
4.8/5
(46)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

(Multiple Choice)
4.9/5
(38)

COGNITIVE ASSESSMENT Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

(Multiple Choice)
4.8/5
(31)

Critical Thinking Questions Case 11-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. All of the following are permissible under a EULA except which of the following?

(Multiple Choice)
4.8/5
(43)

A honeypot is a vulnerable computer designed to entice an intruder to hack into it.

(True/False)
4.9/5
(43)

Critical Thinking Questions Case 11-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is NOT a question of computer ethics?

(Multiple Choice)
4.9/5
(33)

Which of the following is an authorized person or company that issues and verifies digital certificates?

(Multiple Choice)
5.0/5
(44)
Showing 41 - 60 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)