Exam 5: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computer monitoring programs can keep a log of all computer keystrokes performed on a computer, record the activities taking place, take screen shots of the screen at specified intervals, and more. _________________________

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

____________________ databases contain marketing and demographic data about people, such as where they live and what products they buy.

Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Verified

Marketing

____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth)automatically without any user interaction.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________

(True/False)
4.8/5
(29)

For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.

(Multiple Choice)
4.7/5
(40)

Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case?

(Multiple Choice)
4.9/5
(29)

For users who need more protection than a protective case can provide, ____________________ devices (such as portable computers and mobile phones)are available.

(Short Answer)
4.8/5
(23)

By ____________________ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.

(Short Answer)
4.8/5
(33)

Often used in conjunction with face recognition technology , public video surveillance systems are used to try to identify known terrorists and other criminals, to identify criminals whose crimes are caught on tape, and to prevent crimes from occurring. _________________________

(True/False)
4.8/5
(43)

One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is device ____________________ software.

(Short Answer)
4.8/5
(43)

Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits is called ____________________.

(Short Answer)
4.8/5
(33)

____________________ occurs when hardware is stolen from an individual or from a business, school, or other organization.

(Short Answer)
4.8/5
(36)

According to the American Management Association (AMA), the vast majority of all U.S. companies use some type of electronic surveillance with their employees. However, it is uncommon for employers to discipline employees for misuse of e-mail or the Internet at work.

(True/False)
4.9/5
(25)

Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and/or play a sound to help the owner locate the phone if it is nearby. _________________________

(True/False)
5.0/5
(35)

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

(Multiple Choice)
4.9/5
(32)

New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.

(Multiple Choice)
4.7/5
(35)

  Users who want their desktop computers to remain powered up when the electricity goes off should use a(n)____, as shown in the accompanying figure. Users who want their desktop computers to remain powered up when the electricity goes off should use a(n)____, as shown in the accompanying figure.

(Multiple Choice)
4.9/5
(33)

Law enforcement agencies contend that ____________________ systems and public video surveillance are no different than the many private video surveillance systems in place today.

(Short Answer)
4.8/5
(32)

You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.

(True/False)
4.9/5
(38)

At the present time, opting-out procedures are confusing and time-consuming, and they do not always work well.

(True/False)
4.8/5
(31)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)