Exam 4: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

(Multiple Choice)
4.8/5
(28)

Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.

(Multiple Choice)
4.8/5
(36)

____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.

(Short Answer)
4.7/5
(30)

____ uses a single secret key to both encrypt and decrypt the file or message.

(Multiple Choice)
4.9/5
(30)

____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

(Multiple Choice)
4.7/5
(47)

The Fair and Accurate Credit Transactions Act (FACTA)enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.

(True/False)
5.0/5
(41)

A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there. _________________________

(True/False)
4.8/5
(37)

A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

(Multiple Choice)
4.9/5
(37)

Computer crime is sometimes referred to as ____.

(Multiple Choice)
4.7/5
(35)

Many Internet security concerns today can be categorized as cybercrimes.

(True/False)
4.9/5
(39)

How does a virtual private network (VPN)provide security?

(Essay)
4.9/5
(25)

A computer that is controlled by a hacker or other computer criminal is referred to as a(n)botherder or zombie computer. _________________________

(True/False)
4.8/5
(36)

Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with. _________________________

(True/False)
4.8/5
(29)

A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

(Multiple Choice)
4.7/5
(38)

Cuts or other changes to a finger may prevent access via a(n)keystroke reader . _________________________

(True/False)
4.9/5
(28)

A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a(n)____________________.

(Short Answer)
4.9/5
(36)

Repeated threats or other harassment carried out online between adults is referred to as ____.

(Multiple Choice)
4.8/5
(29)

A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

(Multiple Choice)
4.8/5
(41)

It is important to select strong passwords and change them frequently.

(True/False)
4.7/5
(25)

____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.

(Short Answer)
4.9/5
(38)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)