Exam 9: Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ identify users by a particular, measurable, unique physical characteristic.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

Biometric access systems

The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

Encryption that uses 16-character keys is known as ____ .

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

____  refers to the complete malfunction of a computer system.

(Multiple Choice)
4.8/5
(37)

____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

(Multiple Choice)
4.8/5
(47)

To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.

(Multiple Choice)
4.9/5
(33)

A marketing activity that can be considered a privacy risk is ____.

(Multiple Choice)
4.8/5
(46)

____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

(Multiple Choice)
4.9/5
(44)

There are many options for protecting yourself against computer monitoring by your employer or the government.

(True/False)
5.0/5
(34)

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

(Multiple Choice)
4.8/5
(39)

One of the most obvious types of hardware loss is hardware theft . _________________________

(True/False)
4.8/5
(35)

A(n)  Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________

(True/False)
4.8/5
(36)

____________________ is the ability of one computing device to identify another device on the same network and determine its status.

(Short Answer)
4.9/5
(34)

Computer hardware can ​be damaged by ____________________ fluctuations, heat, dust, static electricity, water, and abuse.

(Short Answer)
4.8/5
(38)

Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.

(Multiple Choice)
4.8/5
(37)

By ____, you instruct companies with whom you do business not to share your personal information with third parties.

(Multiple Choice)
4.9/5
(36)

A computer that is controlled by a hacker or other computer criminal is referred to as a(n) ____________________.

(Short Answer)
4.9/5
(35)

A(n) ____________________, is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it shuts down or simply can no longer handle requests, causing legitimate users to be denied service.

(Short Answer)
4.9/5
(31)

A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

(Multiple Choice)
4.8/5
(36)

To supplement backup procedures, businesses and other organizations should have a(n) ____.

(Multiple Choice)
5.0/5
(29)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)