Exam 9: Network and Internet Security
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: The System Unit: Processing and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software100 Questions
Exam 7: Computer Networks100 Questions
Exam 8: The Internet and the World Wide Web100 Questions
Exam 9: Network and Internet Security100 Questions
Select questions type
Increasingly, computers and hard drives are ____________________; that is, encrypting all data automatically and invisibly to the user.
(Short Answer)
4.9/5
(43)
Biometric access systems use a(n) ____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
(Short Answer)
4.8/5
(45)
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
(Multiple Choice)
4.8/5
(26)
Phishing schemes use legitimate-looking e-mails to trick users into providing private information.
(True/False)
4.8/5
(41)
Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.
(Multiple Choice)
4.9/5
(36)
____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
(Short Answer)
5.0/5
(41)
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail, proprietary encrypted e-mail can be used.
(True/False)
4.8/5
(28)
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.
(Multiple Choice)
4.8/5
(33)
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
(Multiple Choice)
4.8/5
(33)
A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n) ____________________.
(Short Answer)
4.8/5
(44)
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.
(Multiple Choice)
4.8/5
(40)
Like a computer virus, a computer worm infects other computer files to replicate itself.
(True/False)
4.8/5
(31)
Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller.
(True/False)
4.8/5
(43)
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
(Multiple Choice)
4.9/5
(39)
To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.
(Short Answer)
4.9/5
(34)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)