Exam 9: Security and Privacy
Exam 1: Introduction to the World of Technology100 Questions
Exam 2: The System Unit, Processing, and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software: Desktop and Mobile Apps100 Questions
Exam 7: Networks and Communication Devices100 Questions
Exam 8: The Internet100 Questions
Exam 9: Security and Privacy100 Questions
Exam 10: Information Systems and System Development100 Questions
Exam 11: Program Development and Programming Languages100 Questions
Exam 12: Databases and Database Management Systems100 Questions
Exam 13: Intellectual Property Rights, Ethics, Health, Access, and the Environment100 Questions
Select questions type
____________________ identify users by a particular, measurable, unique physical characteristic.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Biometric access systems
The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
Encryption that uses 16-character keys is known as ____ .
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
____ refers to the complete malfunction of a computer system.
(Multiple Choice)
4.8/5
(37)
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.
(Multiple Choice)
4.8/5
(47)
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.
(Multiple Choice)
4.9/5
(33)
A marketing activity that can be considered a privacy risk is ____.
(Multiple Choice)
4.8/5
(46)
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.
(Multiple Choice)
4.9/5
(44)
There are many options for protecting yourself against computer monitoring by your employer or the government.
(True/False)
5.0/5
(34)
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
(Multiple Choice)
4.8/5
(39)
One of the most obvious types of hardware loss is hardware theft . _________________________
(True/False)
4.8/5
(35)
A(n) Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________
(True/False)
4.8/5
(36)
____________________ is the ability of one computing device to identify another device on the same network and determine its status.
(Short Answer)
4.9/5
(34)
Computer hardware can be damaged by ____________________ fluctuations, heat, dust, static electricity, water, and abuse.
(Short Answer)
4.8/5
(38)
Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.
(Multiple Choice)
4.8/5
(37)
By ____, you instruct companies with whom you do business not to share your personal information with third parties.
(Multiple Choice)
4.9/5
(36)
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) ____________________.
(Short Answer)
4.9/5
(35)
A(n) ____________________, is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it shuts down or simply can no longer handle requests, causing legitimate users to be denied service.
(Short Answer)
4.9/5
(31)
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
(Multiple Choice)
4.8/5
(36)
To supplement backup procedures, businesses and other organizations should have a(n) ____.
(Multiple Choice)
5.0/5
(29)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)