Exam 4: Network and Internet Security
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: A Closer Look at Hardware and Software100 Questions
Exam 3: The Internet and the World Wide Web100 Questions
Exam 4: Network and Internet Security100 Questions
Exam 5: Computer Security and Privacy100 Questions
Exam 6: Intellectual Property Rights and Ethics100 Questions
Exam 7: Health, Access and the Environment100 Questions
Exam 8: Emerging Technologies100 Questions
Select questions type
One emerging type of Trojan horse is called a ____-Access Trojan.
(Multiple Choice)
4.9/5
(26)
Online fraud, theft, scams, and other related activities are collectively referred to as ____________________.
(Short Answer)
5.0/5
(23)
____ identify users by a particular unique biological characteristic.
(Multiple Choice)
4.7/5
(33)
____ software can control which devices can be connected to an employee's computer.
(Multiple Choice)
4.8/5
(30)
A fingerprint recognition system is typically used to protect access to office computers, to automatically supply Web site passwords on home computers, and to pay for products or services.
(True/False)
4.9/5
(32)
Numeric passwords are referred to passcodes . _________________________
(True/False)
4.8/5
(37)
____ refers to the act of breaking into a computer or network.
(Multiple Choice)
4.7/5
(40)
____________________ often find their victims online- for instance, someone in a chat room who makes a comment or has a screen name that they do not like.
(Short Answer)
4.8/5
(32)
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.

(Multiple Choice)
4.7/5
(37)
A computer virus that activates when it detects a certain condition, such as when a particular keystroke is pressed, is called a(n)____________________.
(Short Answer)
4.8/5
(31)
Phishing schemes use legitimate-looking e-mails to trick users into providing private information. _________________________
(True/False)
4.9/5
(40)
Once installed, ____________________ are designed to record every keystroke made on the infected computer and transmit account numbers, passwords, and other related information to criminals.
(Short Answer)
4.8/5
(28)
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
(Multiple Choice)
4.7/5
(40)
Unauthorized use involves using a computer resource for unauthorized activities.
(True/False)
4.8/5
(38)
AntiDoS software is used to detect and eliminate computer viruses and other types of malware. _________________________
(True/False)
5.0/5
(36)
Denial of service attacks are usually of insignificant cost in terms of business lost.
(True/False)
4.8/5
(38)
Information used in identity theft can be obtained by skimming or via social engineering.
(True/False)
4.8/5
(34)
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.
(Multiple Choice)
4.7/5
(21)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)