Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

(Multiple Choice)
4.8/5
(43)

A computer that is controlled by a hacker or other computer criminal is referred to as a(n) botherder or zombie computer.

(True/False)
4.8/5
(40)

____________________ includes any illegal act involving a computer.

(Short Answer)
4.7/5
(35)

In spoofing , terrorists launch attacks via the Internet.

(True/False)
4.7/5
(30)

Information used in identity theft can be obtained by skimming or via social engineering.

(True/False)
4.8/5
(50)

Cuts or other changes to a finger may prevent access via a(n) keystroke reader .

(True/False)
4.8/5
(27)

A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.

(True/False)
4.8/5
(27)

Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.

(Multiple Choice)
4.8/5
(44)

Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.

(True/False)
4.9/5
(39)

A fingerprint recognition system is typically used to protect access to office computers, to automatically supply Web site passwords on home computers, and to pay for products or services.

(True/False)
4.8/5
(46)

Repeated threats or other harassment carried out online between adults is referred to as ____.

(Multiple Choice)
4.7/5
(38)

____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

(Multiple Choice)
4.8/5
(38)

The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

(Multiple Choice)
4.8/5
(35)

____ are acts of malicious destruction to a computer or computer resource.

(Multiple Choice)
4.9/5
(30)

Fortunately, identity theft is declining and does not pose a real danger to individuals today.

(True/False)
4.8/5
(41)

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

(Multiple Choice)
4.9/5
(47)

____ is a generic term that refers to any type of malicious software.

(Multiple Choice)
4.8/5
(41)

Internet offer scams include a wide range of scams offered through Web sites or unsolicited e-mails.

(True/False)
4.8/5
(35)

Denial of service attacks are usually of insignificant cost in terms of business lost.

(True/False)
4.8/5
(34)

How do firewalls work?

(Essay)
4.7/5
(35)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)