Exam 6: Security and Privacy
Exam 1: Introduction to Computers and the Internet74 Questions
Exam 2: Computer Hardware78 Questions
Exam 3: Computer Software75 Questions
Exam 4: Computer Networks75 Questions
Exam 5: The Internet and Email75 Questions
Exam 6: Security and Privacy74 Questions
Exam 7: Exploring Windows 10 and Managing Files82 Questions
Exam 8: Using Edge Mail and People74 Questions
Exam 9: Introducing Microsoft Office 201674 Questions
Exam 10: Creating a Document74 Questions
Exam 11: Formatting a Long Document74 Questions
Exam 12: Enhancing a Document74 Questions
Exam 13: Creating a Workbook74 Questions
Exam 14: Working With Formulas and Functions77 Questions
Exam 15: Creating an Advanced Workbook74 Questions
Exam 16: Inserting and Formatting Charts74 Questions
Exam 17: Creating a Database74 Questions
Exam 18: Maintaining and Querying a Database74 Questions
Exam 19: Creating Forms and Reports74 Questions
Exam 20: Creating Apresentation76 Questions
Exam 21: Enhancing a Presentation74 Questions
Exam 22: Integrating Word, Excel, Access and Powerpoint74 Questions
Select questions type
_________ is the use of two different access control methods to validate a user.
A)Two-factor authentication
B)Two-factor pattern control
C)Two-factor authorization
D)Two-factor access arrangement
(Short Answer)
4.9/5
(35)
_________ is the act of recording or observing the actions of people on the job.
A)Employee monitoring
B)Employee tagging
C)Employee grouping
D)Employee validating
(Short Answer)
4.8/5
(38)
Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
(Multiple Choice)
4.9/5
(38)
A _____ requires the person requesting access to provide information that only an authorized user is supposed to know.
(Multiple Choice)
4.8/5
(34)
_____ usually combines some type of possessed knowledge along with either a possessed object or a biometric feature.
(Multiple Choice)
5.0/5
(40)
Two of the most common ways individuals are harassed online are cyberbullying and _____.
(Multiple Choice)
4.8/5
(34)
The _____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
(Multiple Choice)
4.7/5
(36)
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users' personal information.
(Multiple Choice)
4.8/5
(39)
Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers.
Luke floods his organization's server with multiple requests so that the server can no longer handle genuine requests. This impacts the productivity of the organization. This act of sabotage is called _____.
(Multiple Choice)
4.8/5
(37)
_________ is accessing someone else's unsecured Wi-Fi network from the hacker's current location without authorization.
A)Wi-Fi piggybacking
B)Wi-Fi wardriving
C)Wi-Fi cyberterrorism
D)Wi-Fi maneuvering
(Short Answer)
4.8/5
(47)
_____ occurs when someone obtains enough information about a person to be able to masquerade as that person.
(Multiple Choice)
4.9/5
(40)
Harassment others via the Internet, such as through email, text messaging, a social networking site, or other online communications method, is referred to as _________.
A)cyberbullying
B)cybersquatting
C)net spoofing
D)larceny spoofing
(Short Answer)
4.9/5
(41)
_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers.
(Multiple Choice)
4.8/5
(37)
Rosanna has assembled her new personal computer . While purchasing the system, the vendor suggested that she use a(n) _____ to protect the computer from damage due to power fluctuations.
(Multiple Choice)
4.9/5
(37)
The _____ has been controversial since it was passed in 1998, and, in fact, it has never been implemented.
(Multiple Choice)
4.9/5
(34)
_________ involves terrorists launching attacks via the Internet.
A)Cyberterrorism
B)Virtual terrorism
C)Digital terrorism
D)Socioterrorism
(Short Answer)
4.9/5
(30)
Abby writes a program that redirects users trying to visit a Web site to a bogus Web site created by him. The scam Abby has committed is called _____.
(Multiple Choice)
5.0/5
(39)
Showing 21 - 40 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)