Exam 4: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ includes any acts of malicious destruction to a computer or computer resource.

(Multiple Choice)
4.9/5
(37)

____________________ includes any illegal act involving a computer.

(Short Answer)
4.8/5
(42)

Older 40-bit encryption (which can only use keys that are 40 bits or 5 characters long)is considered ____________________.

(Short Answer)
5.0/5
(27)

Public key encryption is also called ____________________ encryption.

(Short Answer)
4.9/5
(38)

A(n)denial of service (DoS)attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer. _________________________

(True/False)
5.0/5
(45)

A ____ is a malicious program that masquerades as something else-usually as some type of application program.

(Multiple Choice)
4.9/5
(28)

The purpose of a(n)____________________ is to authenticate the identity of an individual or organization.

(Short Answer)
4.9/5
(34)

According to a recent study, the total cost per data breach in ____ is $5.4 million-the highest of any country.

(Multiple Choice)
4.9/5
(39)

In spoofing , terrorists launch attacks via the Internet. _________________________

(True/False)
4.8/5
(35)

How do firewalls work?

(Essay)
5.0/5
(38)

Fortunately, identity theft is declining and poses a much smaller danger to individuals today.

(True/False)
4.9/5
(40)

Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. _________________________

(True/False)
4.8/5
(35)

Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.

(True/False)
4.9/5
(37)

Biometric access systems use a(n)____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.

(Short Answer)
4.8/5
(39)

The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

(Multiple Choice)
4.7/5
(33)

Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

(Multiple Choice)
4.8/5
(30)

A(n)____________________ is a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender of a document.

(Short Answer)
4.9/5
(42)

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

(Multiple Choice)
4.9/5
(37)

Biometric authentication uses information that an individual should know or can easily remember.

(True/False)
4.9/5
(37)

Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.

(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)