Exam 6: Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ is the use of two different access control methods to validate a user. A)Two-factor authentication B)Two-factor pattern control C)Two-factor authorization D)Two-factor access arrangement

(Short Answer)
4.9/5
(35)

_________ is the act of recording or observing the actions of people on the job. A)Employee monitoring B)Employee tagging C)Employee grouping D)Employee validating

(Short Answer)
4.8/5
(38)

Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.

(Multiple Choice)
4.9/5
(38)

A _____ requires the person requesting access to provide information that only an authorized user is supposed to know.

(Multiple Choice)
4.8/5
(34)

_____ usually combines some type of possessed knowledge along with either a possessed object or a biometric feature.

(Multiple Choice)
5.0/5
(40)

Discuss spamming with relevant examples.

(Essay)
4.8/5
(40)

Two of the most common ways individuals are harassed online are cyberbullying and _____.

(Multiple Choice)
4.8/5
(34)

The _____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

(Multiple Choice)
4.7/5
(36)

_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users' personal information.

(Multiple Choice)
4.8/5
(39)

_____ is the complete malfunction of a computer.

(Multiple Choice)
4.8/5
(38)

Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers. Luke floods his organization's server with multiple requests so that the server can no longer handle genuine requests. This impacts the productivity of the organization. This act of sabotage is called _____.

(Multiple Choice)
4.8/5
(37)

_________ is accessing someone else's unsecured Wi-Fi network from the hacker's current location without authorization. A)Wi-Fi piggybacking B)Wi-Fi wardriving C)Wi-Fi cyberterrorism D)Wi-Fi maneuvering

(Short Answer)
4.8/5
(47)

_____ occurs when someone obtains enough information about a person to be able to masquerade as that person.

(Multiple Choice)
4.9/5
(40)

Harassment others via the Internet, such as through email, text messaging, a social networking site, or other online communications method, is referred to as _________. A)cyberbullying B)cybersquatting C)net spoofing D)larceny spoofing

(Short Answer)
4.9/5
(41)

_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers.

(Multiple Choice)
4.8/5
(37)

Rosanna has assembled her new personal computer . While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.

(Multiple Choice)
4.9/5
(37)

The accompanying figure shows the working of _____ . The accompanying figure shows the working of _____ .

(Multiple Choice)
4.8/5
(33)

The _____ has been controversial since it was passed in 1998, and, in fact, it has never been implemented.

(Multiple Choice)
4.9/5
(34)

_________ involves terrorists launching attacks via the Internet. A)Cyberterrorism B)Virtual terrorism C)Digital terrorism D)Socioterrorism

(Short Answer)
4.9/5
(30)

Abby writes a program that redirects users trying to visit a Web site to a bogus Web site created by him. The scam Abby has committed is called _____.

(Multiple Choice)
5.0/5
(39)
Showing 21 - 40 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)