Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.

(Short Answer)
4.8/5
(36)

When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.

(Multiple Choice)
4.9/5
(43)

A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there.

(True/False)
4.9/5
(44)

A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

(Multiple Choice)
4.8/5
(32)

____ refers to the act of breaking into a computer or network.

(Multiple Choice)
4.9/5
(30)

Online fraud, theft, scams, and other related activities are collectively referred to as ____________________.

(Short Answer)
4.8/5
(48)

The Fair and Accurate Credit Transactions Act (FACTA) enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.

(True/False)
4.8/5
(34)

____________________ often find their victims online- for instance, someone in a chat room who makes a comment or has a screen name that they do not like.

(Short Answer)
4.8/5
(36)

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

(Multiple Choice)
4.8/5
(38)

Many Internet security concerns today can be categorized as cybercrimes.

(True/False)
4.8/5
(35)

Older 40-bit encryption (which can only use keys that are 40 bits or 5 characters long) is considered ____________________.

(Short Answer)
4.9/5
(41)

When you send someone an encrypted message using public key encryption, only a public key is necessary to decrypt it.

(True/False)
4.8/5
(34)

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

(Multiple Choice)
4.8/5
(41)

____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

(Multiple Choice)
4.8/5
(34)

  A(n) ____________________, such as the one shown in the accompanying figure, is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access. A(n) ____________________, such as the one shown in the accompanying figure, is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

(Short Answer)
4.8/5
(46)

Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.

(True/False)
4.8/5
(32)

Wi-Fi security features work by default.

(True/False)
4.8/5
(38)

The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

(Multiple Choice)
4.9/5
(31)

One of the biggest disadvantages of password-based systems is that passwords can be forgotten.

(True/False)
4.9/5
(31)

While two-factor authentication systems are common in the United States, they are not widely used in other countries.

(True/False)
4.7/5
(32)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)