Exam 6: Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Harvey, a burglar, breaks into a senior security officer's house by tapping a valid NFC cardon to the door's sensor. However, when opens the officer's room, the security system asks for finger print verification. When he places his finger on the sensor, the alarm goes off and he gets caught. Here, the officer has used _____ to protect his room.

(Multiple Choice)
4.8/5
(33)

Pharming most often takes place via a company's DNS server, which routes Web page requests corresponding to company URLs.

(True/False)
4.9/5
(39)

​ According to a report by security company Websense, more than half of the Web sites classified as malicious are actually legitimate Web sites that have been compromised.

(True/False)
4.9/5
(46)

The Sarbanes-Oxley Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data.

(True/False)
4.8/5
(37)

Jade has planned to open a new cosmetics shop. Before starting her business, she wishes to identify and analyze her potential customers. Jade can obtain the required information from _____ databases.

(Multiple Choice)
4.8/5
(38)

An employee using an office computer to check personal emails is an example of _____.

(Multiple Choice)
4.8/5
(29)

Discuss in detail about phishing and pharming with relevant examples.

(Essay)
4.9/5
(38)

The _____ grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.

(Multiple Choice)
4.8/5
(36)

_________ includes any illegal act involving a computer. A)Cybercrime B)Virtual crime C)Inchoate crime D)Cyberobjectivity

(Short Answer)
4.9/5
(34)

_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to. A)War driving B)Wi-Fi piggybacking C)Cyber steering D)Virtual sponging

(Short Answer)
4.8/5
(35)

Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of the hacker at that time.

(True/False)
4.9/5
(45)

Suzy loses her smartphone in a concert. She uses a software to remotely erase all the data on her device. She also sends an alarm signal to her device through the software. Identify the software that Suzy has used .

(Multiple Choice)
4.8/5
(32)

To protect a computer from damage due to power fluctuations, a _________ can be used whenever the computer is plugged into a power outlet. A)surge suppressor B)power controller C)surge switcher D)power regulator

(Short Answer)
4.7/5
(39)

_____ refers to following a predesignated procedure to eliminate oneself from marketing lists or otherwise preventing any personal information from being obtained or shared by others.

(Multiple Choice)
4.9/5
(38)
Showing 61 - 74 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)