Exam 11: Computer Security and Safety, Ethics, and Privacy
Exam 1: Introduction to Computers181 Questions
Exam 2: The Internet and the World Wide Web181 Questions
Exam 3: Application Software181 Questions
Exam 4: The Components of the Unit System181 Questions
Exam 5: Input181 Questions
Exam 6: Output181 Questions
Exam 7: Storage181 Questions
Exam 8: Operating Systems and Utility Programs181 Questions
Exam 9: Communications and Networks181 Questions
Exam 10: Database Management181 Questions
Exam 11: Computer Security and Safety, Ethics, and Privacy181 Questions
Exam 12: Information System Development181 Questions
Exam 13: Programming Languages and Program Development181 Questions
Exam 14: Enterprise Computing181 Questions
Exam 15: Computer Careers and Certification181 Questions
Select questions type
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following, or programs that act without a user's knowledge and deliberately alter the computer's operations?
(Multiple Choice)
4.9/5
(33)
Spim are messages like those in the accompanying figure, but sent via VoIP.
(True/False)
4.9/5
(27)
COGNITIVE ASSESSMENT Which vendor is the world's largest dedicated security technology company?
(Multiple Choice)
4.8/5
(25)
COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?
(Multiple Choice)
4.9/5
(43)
Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer.
(True/False)
4.9/5
(32)
COGNITIVE ASSESSMENT What is the problem with the Fair Credit Reporting Act?
(Multiple Choice)
4.7/5
(35)
Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.
(Not Answered)
This question doesn't have any answer yet
A(n) ____________________ is a separate area of a hard disk that holds an infected file until the infection can be removed.
(Short Answer)
4.8/5
(41)
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
(Multiple Choice)
4.7/5
(39)
A surge protector absorbs small overvoltages - generally without damage to the computer or equipment.
(True/False)
4.9/5
(38)
To utilize intrusion detection software requires little expertise because the programs--which automatically analyzes network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches--are simple and easy to use and interpret.
(True/False)
4.7/5
(35)
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
(Multiple Choice)
4.8/5
(46)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
(Multiple Choice)
4.9/5
(38)
COGNITIVE ASSESSMENT Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
(Multiple Choice)
4.8/5
(31)
Critical Thinking Questions Case 11-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. All of the following are permissible under a EULA except which of the following?
(Multiple Choice)
4.8/5
(43)
A honeypot is a vulnerable computer designed to entice an intruder to hack into it.
(True/False)
4.9/5
(43)
Critical Thinking Questions Case 11-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is NOT a question of computer ethics?
(Multiple Choice)
4.9/5
(33)
Which of the following is an authorized person or company that issues and verifies digital certificates?
(Multiple Choice)
5.0/5
(44)
Showing 41 - 60 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)