Exam 4: Network and Internet Security
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: A Closer Look at Hardware and Software100 Questions
Exam 3: The Internet and the World Wide Web100 Questions
Exam 4: Network and Internet Security100 Questions
Exam 5: Computer Security and Privacy100 Questions
Exam 6: Intellectual Property Rights and Ethics100 Questions
Exam 7: Health, Access and the Environment100 Questions
Exam 8: Emerging Technologies100 Questions
Select questions type
____ includes any acts of malicious destruction to a computer or computer resource.
(Multiple Choice)
4.9/5
(37)
____________________ includes any illegal act involving a computer.
(Short Answer)
4.8/5
(42)
Older 40-bit encryption (which can only use keys that are 40 bits or 5 characters long)is considered ____________________.
(Short Answer)
5.0/5
(27)
Public key encryption is also called ____________________ encryption.
(Short Answer)
4.9/5
(38)
A(n)denial of service (DoS)attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer. _________________________
(True/False)
5.0/5
(45)
A ____ is a malicious program that masquerades as something else-usually as some type of application program.
(Multiple Choice)
4.9/5
(28)
The purpose of a(n)____________________ is to authenticate the identity of an individual or organization.
(Short Answer)
4.9/5
(34)
According to a recent study, the total cost per data breach in ____ is $5.4 million-the highest of any country.
(Multiple Choice)
4.9/5
(39)
In spoofing , terrorists launch attacks via the Internet. _________________________
(True/False)
4.8/5
(35)
Fortunately, identity theft is declining and poses a much smaller danger to individuals today.
(True/False)
4.9/5
(40)
Online auction spam occurs when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. _________________________
(True/False)
4.8/5
(35)
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
(True/False)
4.9/5
(37)
Biometric access systems use a(n)____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.
(Short Answer)
4.8/5
(39)
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
(Multiple Choice)
4.7/5
(33)
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
(Multiple Choice)
4.8/5
(30)
A(n)____________________ is a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender of a document.
(Short Answer)
4.9/5
(42)
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
(Multiple Choice)
4.9/5
(37)
Biometric authentication uses information that an individual should know or can easily remember.
(True/False)
4.9/5
(37)
Increasingly, USB security keys, also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features-are being used.
(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)