Exam 4: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discuss online auction fraud.

(Essay)
4.9/5
(41)

The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

(Multiple Choice)
4.9/5
(34)

Private key encryption is also called symmetric key encryption.

(True/False)
4.7/5
(46)

Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

(Multiple Choice)
4.8/5
(38)

Like a computer virus, a ____ is a malicious program designed to cause damage.

(Multiple Choice)
4.9/5
(30)

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

(Multiple Choice)
4.8/5
(36)

Typically, ____________________ begins with obtaining a person's name and Social Security number, often from a credit application, rental application, or similar form.

(Short Answer)
4.8/5
(43)

Computer spyware includes any illegal act involving a computer. _________________________

(True/False)
4.8/5
(34)

To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.

(Short Answer)
4.8/5
(36)

Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. One of the first items that Melissa installed was a(n)____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.

(Multiple Choice)
5.0/5
(31)

When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.

(Multiple Choice)
4.9/5
(39)

A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.

(True/False)
4.8/5
(28)

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

(Multiple Choice)
4.7/5
(29)

Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa also decided to use a(n)____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

(Multiple Choice)
4.9/5
(41)

Digital certificates are obtained from a(n)____________________ and typically contain the name of the person, organization, or Web site being certified along with a certificate serial number, an expiration date, and a public/private key pair.

(Short Answer)
4.9/5
(33)

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

(Multiple Choice)
4.9/5
(31)

When you send someone an encrypted message using public key encryption, only a public key is necessary to decrypt it.

(True/False)
4.8/5
(41)

The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

(Multiple Choice)
4.8/5
(35)

Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.

(Multiple Choice)
4.8/5
(33)

____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.

(Multiple Choice)
4.7/5
(37)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)