Exam 4: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One emerging type of Trojan horse is called a ____-Access Trojan.

(Multiple Choice)
4.9/5
(26)

Online fraud, theft, scams, and other related activities are collectively referred to as ____________________.

(Short Answer)
5.0/5
(23)

Wi-Fi security features work by default.

(True/False)
4.7/5
(17)

____ identify users by a particular unique biological characteristic.

(Multiple Choice)
4.7/5
(33)

____ software can control which devices can be connected to an employee's computer.

(Multiple Choice)
4.8/5
(30)

A fingerprint recognition system is typically used to protect access to office computers, to automatically supply Web site passwords on home computers, and to pay for products or services.

(True/False)
4.9/5
(32)

What are access control systems used for?

(Essay)
4.9/5
(45)

Numeric passwords are referred to passcodes . _________________________

(True/False)
4.8/5
(37)

____ refers to the act of breaking into a computer or network.

(Multiple Choice)
4.7/5
(40)

____________________ often find their victims online- for instance, someone in a chat room who makes a comment or has a screen name that they do not like.

(Short Answer)
4.8/5
(32)

  The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate. The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

(Multiple Choice)
4.7/5
(37)

A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n)____________________.

(Short Answer)
4.8/5
(31)

Phishing schemes use legitimate-looking e-mails to trick users into providing private information. _________________________

(True/False)
4.9/5
(40)

Once installed, ____________________ are designed to record every keystroke made on the infected computer and transmit account numbers, passwords, and other related information to criminals.

(Short Answer)
4.8/5
(28)

A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

(Multiple Choice)
4.7/5
(40)

Unauthorized use involves using a computer resource for unauthorized activities.

(True/False)
4.8/5
(38)

AntiDoS software is used to detect and eliminate computer viruses and other types of malware. _________________________

(True/False)
5.0/5
(36)

Denial of service attacks are usually of insignificant cost in terms of business lost.

(True/False)
4.8/5
(38)

Information used in identity theft can be obtained by skimming or via social engineering.

(True/False)
4.8/5
(34)

Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.

(Multiple Choice)
4.7/5
(21)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)