Exam 4: Network and Internet Security
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: A Closer Look at Hardware and Software100 Questions
Exam 3: The Internet and the World Wide Web100 Questions
Exam 4: Network and Internet Security100 Questions
Exam 5: Computer Security and Privacy100 Questions
Exam 6: Intellectual Property Rights and Ethics100 Questions
Exam 7: Health, Access and the Environment100 Questions
Exam 8: Emerging Technologies100 Questions
Select questions type
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
(Multiple Choice)
4.8/5
(28)
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.
(Multiple Choice)
4.8/5
(36)
____________________ is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
(Short Answer)
4.7/5
(30)
____ uses a single secret key to both encrypt and decrypt the file or message.
(Multiple Choice)
4.9/5
(30)
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
(Multiple Choice)
4.7/5
(47)
The Fair and Accurate Credit Transactions Act (FACTA)enables all Americans to get a free copy of their credit report, upon request, each year from the three major consumer credit bureaus.
(True/False)
5.0/5
(41)
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there. _________________________
(True/False)
4.8/5
(37)
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
(Multiple Choice)
4.9/5
(37)
Many Internet security concerns today can be categorized as cybercrimes.
(True/False)
4.9/5
(39)
A computer that is controlled by a hacker or other computer criminal is referred to as a(n)botherder or zombie computer. _________________________
(True/False)
4.8/5
(36)
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with. _________________________
(True/False)
4.8/5
(29)
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
(Multiple Choice)
4.7/5
(38)
Cuts or other changes to a finger may prevent access via a(n)keystroke reader . _________________________
(True/False)
4.9/5
(28)
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a(n)____________________.
(Short Answer)
4.9/5
(36)
Repeated threats or other harassment carried out online between adults is referred to as ____.
(Multiple Choice)
4.8/5
(29)
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
(Multiple Choice)
4.8/5
(41)
It is important to select strong passwords and change them frequently.
(True/False)
4.7/5
(25)
____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.
(Short Answer)
4.9/5
(38)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)