Exam 11: Computer Security and Safety, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One type of spyware is hidden on Web pages or in e-mail messages in the form of graphical images. What is the term for this type of spyware?

(Multiple Choice)
4.9/5
(34)

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

(Multiple Choice)
4.8/5
(37)

The most common type of license included with software purchased by individual users is a(n) ____________________.

(Short Answer)
4.9/5
(34)

Which of the following is the term for any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer?

(Multiple Choice)
4.7/5
(33)

Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.

(True/False)
4.9/5
(38)

COGNITIVE ASSESSMENT Which of the following terms is used to describe any unwanted signal that is mixed with the normal voltage entering the computer?

(Multiple Choice)
4.8/5
(34)

Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart.

(True/False)
4.8/5
(40)

COGNITIVE ASSESSMENT Define the term, zombie.

(Multiple Choice)
4.8/5
(33)

To remove spyware, users need to obtain a special program that can detect and delete it.

(True/False)
4.8/5
(35)

Critical Thinking Questions Case 11-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following practice IS permissible under a EULA?

(Multiple Choice)
4.8/5
(42)

Any illegal act involving a computer generally is referred to as a computer security crime.

(True/False)
4.8/5
(40)

Many businesses use which of the following to limit employees' Web access?

(Multiple Choice)
4.9/5
(40)

Identification verifies that an individual is the person he or she claims to be.

(True/False)
4.9/5
(35)

COGNITIVE ASSESSMENT Define the term, botnet.

(Multiple Choice)
4.8/5
(39)

A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.

(True/False)
4.8/5
(35)

Carpal tunnel syndrome (CTS) is inflammation of a nerve that connects the forearm to the palm of the wrist.

(True/False)
4.8/5
(34)

Programmers often build trapdoors into programs during system development.

(True/False)
4.8/5
(40)

COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

(Multiple Choice)
4.8/5
(44)

Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.

(True/False)
4.7/5
(36)

Which of the following 1986 laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

(Multiple Choice)
4.9/5
(40)
Showing 121 - 140 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)