Exam 9: Network and Internet Security
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: The System Unit: Processing and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software100 Questions
Exam 7: Computer Networks100 Questions
Exam 8: The Internet and the World Wide Web100 Questions
Exam 9: Network and Internet Security100 Questions
Select questions type
____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.
(Short Answer)
4.8/5
(36)
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
(Multiple Choice)
4.9/5
(43)
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there.
(True/False)
4.9/5
(44)
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
(Multiple Choice)
4.8/5
(32)
____ refers to the act of breaking into a computer or network.
(Multiple Choice)
4.9/5
(30)
Online fraud, theft, scams, and other related activities are collectively referred to as ____________________.
(Short Answer)
4.8/5
(48)
The Fair and Accurate Credit Transactions Act (FACTA) enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.
(True/False)
4.8/5
(34)
____________________ often find their victims online- for instance, someone in a chat room who makes a comment or has a screen name that they do not like.
(Short Answer)
4.8/5
(36)
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
(Multiple Choice)
4.8/5
(38)
Many Internet security concerns today can be categorized as cybercrimes.
(True/False)
4.8/5
(35)
Older 40-bit encryption (which can only use keys that are 40 bits or 5 characters long) is considered ____________________.
(Short Answer)
4.9/5
(41)
When you send someone an encrypted message using public key encryption, only a public key is necessary to decrypt it.
(True/False)
4.8/5
(34)
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
(Multiple Choice)
4.8/5
(41)
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.
(Multiple Choice)
4.8/5
(34)
A(n) ____________________, such as the one shown in the accompanying figure, is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

(Short Answer)
4.8/5
(46)
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.
(True/False)
4.8/5
(32)
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
(Multiple Choice)
4.9/5
(31)
One of the biggest disadvantages of password-based systems is that passwords can be forgotten.
(True/False)
4.9/5
(31)
While two-factor authentication systems are common in the United States, they are not widely used in other countries.
(True/False)
4.7/5
(32)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)