Exam 11: Computer Security and Safety, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Internet advertising firms often use which of the following to collect information about users Web browsing habits?

(Multiple Choice)
4.9/5
(38)

Many businesses use spyware to limit employees' Web access.

(True/False)
4.7/5
(31)

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

(Short Answer)
5.0/5
(40)

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

(Multiple Choice)
4.8/5
(37)

COGNITIVE ASSESSMENT What is an EULA intended to do?

(Multiple Choice)
4.7/5
(30)

A particularly devastating type of DoS attack is which kind of DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks?

(Multiple Choice)
4.9/5
(38)

Many companies use access controls to minimize the chance that a hacker may intentionally access or an employee may accidentally access confidential information on a computer.

(True/False)
4.9/5
(36)

Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?

(Multiple Choice)
4.7/5
(42)

COGNITIVE ASSESSMENT Which of the following statements is not true about user names and passwords?

(Multiple Choice)
4.8/5
(40)

Explain three safeguards you can use to improve the security of wireless networks.

(Essay)
4.8/5
(33)

COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

(Multiple Choice)
4.8/5
(34)

Which of the following is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power?

(Multiple Choice)
4.8/5
(36)

Which of the following occurs when the incoming electrical power increases significantly above the normal 120 volts?

(Multiple Choice)
4.9/5
(42)

  When users purchase software, a(n) ____________________ license agreement like the one in the accompanying figure does not permit users to install the software on a network or to give copies to friends and colleagues. When users purchase software, a(n) ____________________ license agreement like the one in the accompanying figure does not permit users to install the software on a network or to give copies to friends and colleagues.

(Short Answer)
4.8/5
(30)

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.8/5
(28)

One suggestion to safeguard personal information is to avoid shopping clubs and buyer cards.

(True/False)
4.9/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
A scam in which a button or link on a Web site contains a malicious program.
plaintext
A common infringement of copyright.
Digital Millennium Copyright Act (DCMA)
Usually does not have advanced computer and technical skills.
firewall
Correct Answer:
Verified
Premises:
Responses:
A scam in which a button or link on a Web site contains a malicious program.
plaintext
A common infringement of copyright.
Digital Millennium Copyright Act (DCMA)
Usually does not have advanced computer and technical skills.
firewall
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
copyright
Makes it illegal to circumvent antipiracy schemes in commercial software.
zombie
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider.
digital signature
Any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
clickjacking
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
script kiddie
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
ciphertext
It fails to define a legitimate business need.
CA
Protects a network's resources from intrusion.
password
A group of compromised computers.
CTS
In the encryption process, the encrypted (scrambled) data.
noise
The inflammation of the nerve that connects the forearm to the palm of the wrist.
botnet
A notice that guarantees a user or a Web site is legitimate.
digital certificate
Most systems require that a user selects this on his or her own.
Fair Credit Reporting Act
Hidden on Web pages in the form of graphical images
piracy
In the encryption process, the unencrypted, readable data.
virus hoax
Protects any tangible form of expression.
Web bug
An authorized person or company that issues and verifies digital certificates.
CAN-SPAM Act
(Matching)
4.8/5
(46)

Some perpetrators use a technique in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. What is the term this technique?

(Multiple Choice)
4.9/5
(42)

COGNITIVE ASSESSMENT Define the term CAPTCHA.

(Multiple Choice)
4.9/5
(38)

Each character added to a(n) ____________________ significantly increases the number of combinations and the length of time it might take for someone or for a hacker's computer to guess it.

(Short Answer)
4.8/5
(39)
Showing 141 - 160 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)