Exam 5: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The 2013 Secure Our Smartphones (SOS)Initiative is technology that would make all stolen smartphones inoperable, on any network, anywhere in the world, even if the ____________________ card is removed.

(Short Answer)
4.8/5
(39)

What do surge suppressors do?

(Essay)
4.9/5
(34)

Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.

(True/False)
4.8/5
(40)

Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.

(Multiple Choice)
4.7/5
(38)

To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers)that cannot afford to be without power for any period of time, generators can be used. _________________________

(True/False)
4.8/5
(39)

One antipiracy tool is requiring a unique ____ code.

(Short Answer)
4.8/5
(47)

Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting, watermarks , and other difficult-to-reproduce content. _________________________

(True/False)
4.8/5
(38)

Laptop ____________________ software emits a very loud noise if the computer is unplugged, if USB devices are removed, or if the computer is shut down without the owner's permission.

(Short Answer)
5.0/5
(37)

____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example)on a network (such as the Internet or a mobile phone network)to identify another device on the same network and determine its status.

(Multiple Choice)
4.8/5
(32)

To supplement backup procedures, businesses and other organizations should have a(n)____.

(Multiple Choice)
4.8/5
(29)

____ are small programs that take care of software-specific problems, or bugs, such as security holes.

(Multiple Choice)
4.8/5
(40)

A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.

(True/False)
4.8/5
(41)

For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

(Multiple Choice)
4.8/5
(35)

____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

(Multiple Choice)
4.8/5
(37)

____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

(Multiple Choice)
5.0/5
(36)

____________________, the unauthorized copying of a computer program, is illegal in the United States and many other-but not all-countries.

(Short Answer)
4.8/5
(24)

The disaster recovery plan is also called a business continuity plan.

(True/False)
4.9/5
(37)

A government database is a collection of data about people that is collected and maintained by private industry.

(True/False)
4.8/5
(41)

____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.

(Multiple Choice)
4.8/5
(49)

One common way to deal with spam that makes it to your computer is to use a(n)____.

(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)