Exam 6: Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Antivirus can infect any device, including personal computers, smartphones, tablets, and printers that contain computing hardware and software.

(True/False)
4.7/5
(36)

Leslie, a computer hacker, creates a game using malware code for desktop computers. Once users download the game, the malware infects their devices without their knowledge. The type of malware Leslie has programmed into the game is a _____.

(Multiple Choice)
4.9/5
(31)

Matthew faces some network issues with his office system. As the IT help desk team of his company is on leave, he accesses the server room himself and rectifies the problem. However, only the help desk members are allowed to enter the server room. In this scenario, Matthew can be accused of _____.

(Multiple Choice)
4.8/5
(43)

Tracy defaced her school's Web site and posted some irrelevant information on it. This is an example of _____.

(Multiple Choice)
4.8/5
(40)

_________ is the theft of information located on or being sent from a computer or other device. A)Data theft B)Identity theft C)Character theft D)Cyber theft

(Short Answer)
4.9/5
(32)

​ A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____.

(Multiple Choice)
4.8/5
(36)

_____ refers to unsolicited email sent to a large group of individuals at one time.

(Multiple Choice)
4.7/5
(42)

Lia, a project manager at a reputed firm, wants to schedule a meeting with the top management immediately to discuss a high-priority issue. Lia should use _____ to determine the availability status of the concerned people.

(Multiple Choice)
4.8/5
(36)

Sara , the chief finance officer of a consulting firm, wants data to be automatically encrypted when stored on her hard drive. To accomplish this, she must use _____.

(Multiple Choice)
4.9/5
(32)

Repeated threats or other malicious behavior that pose a credible threat of harm carried out online is referred to as DNS spoofing.

(True/False)
4.7/5
(29)

Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers. Luke asks his friends in the organization to flood the network server by sending it unsolicited requests. He does this to avoid being suspected by his employer. This act of sabotage is called _____.

(Multiple Choice)
4.7/5
(39)

John has a laptop that has survived many drops over concrete and withstood extreme temperature variations . John's laptop can be categorized as a _____.

(Multiple Choice)
4.8/5
(28)

A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

(Multiple Choice)
4.8/5
(35)

A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.

(Multiple Choice)
4.9/5
(38)

The purpose of a digital certificate is to authenticate the identity of an individual or organization.

(True/False)
4.8/5
(34)

Social networking sites have privacy features that can be used to protect the private information of their members.

(True/False)
4.7/5
(41)

A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____.

(Multiple Choice)
4.8/5
(34)

The best protection against many dot cons is to protect any identifying information about oneself that could be used in fraudulent activities.

(True/False)
4.8/5
(36)

The accompanying figure shows the working of a _____. The accompanying figure shows the working of a _____.

(Multiple Choice)
4.9/5
(36)

Phil decides to sell his personal computer to buy a new laptop, so he deletes all the data on his hard drive. To ensure that the data on his hard drive cannot be recovered using any special software, he _____ the hard drive-overwrites the hard drive several times using a disk erasing software-before the selling the system.

(Multiple Choice)
4.8/5
(25)
Showing 41 - 60 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)