Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Increasingly, computers and hard drives are ____________________; that is, encrypting all data automatically and invisibly to the user.

(Short Answer)
4.9/5
(43)

Biometric access systems use a(n) ____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.

(Short Answer)
4.8/5
(45)

A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

(Multiple Choice)
4.8/5
(26)

Phishing schemes use legitimate-looking e-mails to trick users into providing private information.

(True/False)
4.8/5
(41)

Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.

(Multiple Choice)
4.9/5
(36)

Computer crime is sometimes referred to as ____.

(Multiple Choice)
4.8/5
(30)

____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.

(Short Answer)
5.0/5
(41)

To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail, proprietary encrypted e-mail can be used.

(True/False)
4.8/5
(28)

How does a virtual private network (VPN) provide security?

(Essay)
4.8/5
(37)

Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.

(Multiple Choice)
4.8/5
(33)

What are access control systems used for?

(Essay)
4.8/5
(32)

A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

(Multiple Choice)
4.8/5
(33)

USB security keys are also called USB security tokens .

(True/False)
4.8/5
(41)

A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n) ____________________.

(Short Answer)
4.8/5
(44)

Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.

(Multiple Choice)
4.8/5
(40)

Like a computer virus, a computer worm infects other computer files to replicate itself.

(True/False)
4.8/5
(31)

The best protection against many dot cons is ____.

(Multiple Choice)
4.7/5
(31)

Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller.

(True/False)
4.8/5
(43)

____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

(Multiple Choice)
4.9/5
(39)

To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.

(Short Answer)
4.9/5
(34)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)