Exam 5: Computer Security and Privacy
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: A Closer Look at Hardware and Software100 Questions
Exam 3: The Internet and the World Wide Web100 Questions
Exam 4: Network and Internet Security100 Questions
Exam 5: Computer Security and Privacy100 Questions
Exam 6: Intellectual Property Rights and Ethics100 Questions
Exam 7: Health, Access and the Environment100 Questions
Exam 8: Emerging Technologies100 Questions
Select questions type
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.
(Multiple Choice)
4.7/5
(34)
In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
(True/False)
4.8/5
(38)
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
(Multiple Choice)
4.8/5
(29)
____________________ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
(Short Answer)
4.8/5
(37)
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.
(Multiple Choice)
4.8/5
(36)
Although many of us may prefer not to think about it, ____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.
(Multiple Choice)
4.8/5
(28)
Phish refers to unsolicited e-mail sent to a large group of individuals at one time.
(True/False)
4.9/5
(31)
____ devices are designed to withstand much more physical abuse than conventional devices.
(Multiple Choice)
4.9/5
(36)
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
(True/False)
4.7/5
(33)
Some local governments permit searches for property located in that area, such as displaying the owner's name, address, and a link to additional information including property value and tax information.
(True/False)
4.7/5
(29)
One software tool that can be used to help increase the chances of a stolen or lost device being recovered is device tracking software. _________________________
(True/False)
5.0/5
(33)
Discuss the proper disposal of hardware containing sensitive information.
(Essay)
4.8/5
(39)
To facilitate using a computer lock, nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.
(Multiple Choice)
4.8/5
(36)
Most businesses and Web sites that collect personal information have a(n)____ that discloses how the personal information you provide will be used.
(Multiple Choice)
4.9/5
(39)
A wireless ____________________ system ties your phone to a key fob in order to sound an alarm and lock the phone if the phone and key fob become further away than the specified allowable distance.
(Short Answer)
4.9/5
(37)
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
(Multiple Choice)
4.9/5
(38)
C-level attacks can occur because of a natural disaster (such as a tornado, fire, flood, or hurricane), sabotage, or terrorist attack. _________________________
(True/False)
4.8/5
(38)
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
(Multiple Choice)
4.9/5
(38)
A(n)____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
(Multiple Choice)
5.0/5
(37)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)