Exam 6: Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ is a way of temporarily converting data into an unreadable form in order to protect that data from being viewed by unauthorized individuals.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

B

​ Liz owns an accounting firm in Seattle. Due to a fire, the company experiences fluctuations in its electricity supply. Liz chalks out a plan that identifies who would take charge in case of a disaster. What type of plan has Liz prepared?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

C

List some common precautions that can reduce the chance of a serious personal safety problem occurring due to online activities.

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

Answers will vary. The following can help you protect yourself against cyberstalking and other types of online harassment:  
Be discreet online and use gender-neutral, nonprovocative identifying names, such as jsmith, instead of janesmith or iamcute.
Be careful about the types of photos you post of yourself online or email to others, and do not reveal personal information, such as your real name, address, or telephone number, to people you meet online.
Do not respond to any insults or other harassing comments you receive online.
Consider requesting that your personal information be removed from online directories, especially those associated with your email address or other online identifiers. If you are a parent, protect your children by monitoring their computer and smartphone activities as well as making sure that they know what activities are off-limits and that they cannot reveal personal information online without your permission.  Please see the section " Cyberstalking and Other Personal Safety Concerns " for more information.

_____ occurs when an online buyer receives the proper items but falsely claims that they never arrived.

(Multiple Choice)
4.8/5
(39)

Helen is the owner of a vintage jewelry shop. A robbery was committed in her shop. Therefore, she decides to install closed-circuit security cameras in her shop to prevent future robberies. Identify the technology Helen has used.

(Multiple Choice)
4.9/5
(36)

One of the most important components of security software is recovery software, which protects against computer viruses and other types of malware.

(True/False)
4.8/5
(46)

Data on Web sites are safe from hackers.

(True/False)
4.9/5
(31)

_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.

(Multiple Choice)
4.8/5
(39)

Collecting in-depth information about an individual is known as _________. A)electronic profiling B)contact skimming C)information phishing D)data marketing

(Short Answer)
4.8/5
(41)

Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks. Doug sends email messages, which look legitimate, to his friends and obtains confidential information-such as credit card details, security numbers, and so on-from them. This is an example of _____.

(Multiple Choice)
4.7/5
(37)

​ According to the FBI, organized crime organizations in many countries are increasingly turning to computer crime to target millions of potential victims.

(True/False)
4.9/5
(48)

A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.

(Multiple Choice)
4.7/5
(31)

_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers.

(Multiple Choice)
4.8/5
(35)

_________ occurs when phishing emails are targeted to a specific individual and appear to come from an organization or person that the targeted individual has an association with. A)Spear phishing B)DNS phishing C)Individual phishing D)Associated phishing

(Short Answer)
4.9/5
(46)

_____ refers to the act of breaking into a computer or network.

(Multiple Choice)
4.8/5
(36)

The _____ regulates how Web sites can collect information from minors and communicate with them.

(Multiple Choice)
4.9/5
(43)

_________ occurs whenever an individual gains admission to a computer, network, file, or other computing resource without permission. A)Unauthorized access B)Network routing C)Network evasion D)Unauthorized termination

(Short Answer)
4.9/5
(33)

Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks. Doug accesses his friend Sasha's Facebook account without her knowledge and sends a message that contains a phishing link to her friends on Facebook. This is a case of _____.

(Multiple Choice)
4.9/5
(32)

Denial of service attacks today are often directed toward popular or controversial sites and typically are carried out via multiple computers. This is known as a concentrated denial of service attack.

(True/False)
4.8/5
(30)

A hacker modifying a Web site to display an official looking message that informs the user that a particular software program must be downloaded to use the site is an example of _________. A)Web site alteration B)Web site proliferation C)Web site phishing D)Web site driving

(Short Answer)
4.8/5
(31)
Showing 1 - 20 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)