Exam 5: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Collecting in-depth information about an individual is known as ____.

(Multiple Choice)
4.8/5
(30)

The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.

(Multiple Choice)
4.9/5
(36)

A growing illegal use of computer monitoring software is for a hacker to use a(n)____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.

(Short Answer)
4.8/5
(33)

By ____, you instruct companies you do business with that they cannot share your personal data with third parties.

(Multiple Choice)
4.8/5
(41)

Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________

(True/False)
4.9/5
(35)

The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________

(True/False)
4.9/5
(36)

  The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN. The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

(Multiple Choice)
4.7/5
(28)

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

(Multiple Choice)
4.8/5
(30)

A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk. _________________________

(True/False)
4.7/5
(36)

There are many options for protecting yourself against computer monitoring by your employer or the government.

(True/False)
4.8/5
(34)

Why should you be concerned about computer security?

(Essay)
4.8/5
(41)

Cookies and spyware are possible privacy risks.

(True/False)
4.8/5
(37)

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

(Multiple Choice)
4.8/5
(30)

Describe e-mail filters.

(Essay)
4.7/5
(37)

To comply with truth-in-advertising laws, a(n)unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________

(True/False)
4.7/5
(42)

When spam is sent via IM it is called ____.

(Multiple Choice)
4.9/5
(37)

The U.S. ____________________ Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.

(Short Answer)
4.7/5
(44)

Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.

(True/False)
4.8/5
(34)

____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.

(Multiple Choice)
4.9/5
(36)

____________________ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.

(Short Answer)
4.9/5
(34)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)