Exam 6: Security and Privacy
Exam 1: Introduction to Computers and the Internet74 Questions
Exam 2: Computer Hardware78 Questions
Exam 3: Computer Software75 Questions
Exam 4: Computer Networks75 Questions
Exam 5: The Internet and Email75 Questions
Exam 6: Security and Privacy74 Questions
Exam 7: Exploring Windows 10 and Managing Files82 Questions
Exam 8: Using Edge Mail and People74 Questions
Exam 9: Introducing Microsoft Office 201674 Questions
Exam 10: Creating a Document74 Questions
Exam 11: Formatting a Long Document74 Questions
Exam 12: Enhancing a Document74 Questions
Exam 13: Creating a Workbook74 Questions
Exam 14: Working With Formulas and Functions77 Questions
Exam 15: Creating an Advanced Workbook74 Questions
Exam 16: Inserting and Formatting Charts74 Questions
Exam 17: Creating a Database74 Questions
Exam 18: Maintaining and Querying a Database74 Questions
Exam 19: Creating Forms and Reports74 Questions
Exam 20: Creating Apresentation76 Questions
Exam 21: Enhancing a Presentation74 Questions
Exam 22: Integrating Word, Excel, Access and Powerpoint74 Questions
Select questions type
Harvey, a burglar, breaks into a senior security officer's house by tapping a valid NFC cardon to the door's sensor. However, when opens the officer's room, the security system asks for finger print verification. When he places his finger on the sensor, the alarm goes off and he gets caught. Here, the officer has used _____ to protect his room.
(Multiple Choice)
4.8/5
(33)
Pharming most often takes place via a company's DNS server, which routes Web page requests corresponding to company URLs.
(True/False)
4.9/5
(39)
According to a report by security company Websense, more than half of the Web sites classified as malicious are actually legitimate Web sites that have been compromised.
(True/False)
4.9/5
(46)
The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data.
(True/False)
4.8/5
(37)
Jade has planned to open a new cosmetics shop. Before starting her business, she wishes to identify and analyze her potential customers. Jade can obtain the required information from _____ databases.
(Multiple Choice)
4.8/5
(38)
An employee using an office computer to check personal emails is an example of _____.
(Multiple Choice)
4.8/5
(29)
Discuss in detail about phishing and pharming with relevant examples.
(Essay)
4.9/5
(38)
The _____ grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.
(Multiple Choice)
4.8/5
(36)
_________ includes any illegal act involving a computer.
A)Cybercrime
B)Virtual crime
C)Inchoate crime
D)Cyberobjectivity
(Short Answer)
4.9/5
(34)
_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to.
A)War driving
B)Wi-Fi piggybacking
C)Cyber steering
D)Virtual sponging
(Short Answer)
4.8/5
(35)
Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of the hacker at that time.
(True/False)
4.9/5
(45)
Suzy loses her smartphone in a concert. She uses a software to remotely erase all the data on her device. She also sends an alarm signal to her device through the software. Identify the software that Suzy has used .
(Multiple Choice)
4.8/5
(32)
To protect a computer from damage due to power fluctuations, a _________ can be used whenever the computer is plugged into a power outlet.
A)surge suppressor
B)power controller
C)surge switcher
D)power regulator
(Short Answer)
4.7/5
(39)
_____ refers to following a predesignated procedure to eliminate oneself from marketing lists or otherwise preventing any personal information from being obtained or shared by others.
(Multiple Choice)
4.9/5
(38)
Showing 61 - 74 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)