Exam 6: Data Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is one term for someone who creates and unleashes malware.

(Multiple Choice)
4.8/5
(29)

When your personal data is used illegally, it is called ____________________.

(Short Answer)
5.0/5
(38)

You have just been hired as an assistant to the network administrator at a local company. You are asked to give a presentation on viruses, worms, bots, Trojans, and spyware and include the unauthorized activities the network might see if malware enters the company's network. Explain how a network traffic jam affects a network.

(Essay)
4.8/5
(28)

Much better security is offered by ____.

(Multiple Choice)
4.8/5
(39)

Some Web sites offer fee-based backup storage space.

(True/False)
4.8/5
(37)

Power strips offer similar protection to surge strips.

(True/False)
4.8/5
(40)

A voltage spike is another term for power spike.

(True/False)
4.7/5
(25)

  The device shown in the figure above is a security plate . The device shown in the figure above is a security plate .

(True/False)
4.8/5
(41)

You have just been hired as an assistant to the network administrator at a local company. You are asked to give a presentation on viruses, worms, bots, Trojans, and spyware and include the unauthorized activities the network might see if malware enters the company's network. Users on the network are blocked from accessing certain Web sites, home page settings are being changed, and browsers are being redirected to infected Web sites. What is the likely problem?

(Essay)
4.8/5
(28)

Spam filters are not included in email clients and security suites.

(True/False)
4.9/5
(40)

  The device shown in the figure above is a locking device . The device shown in the figure above is a locking device .

(True/False)
4.8/5
(33)
Match the computer crime term with its definition.
Intentional defacement of Web sites
brute force attack
Unauthorized alterations to data stored on a computer system
blended threat
An attempt to disrupt the operations of a network
virus distribution
Correct Answer:
Verified
Premises:
Responses:
Intentional defacement of Web sites
brute force attack
Unauthorized alterations to data stored on a computer system
blended threat
An attempt to disrupt the operations of a network
virus distribution
Launching viruses, worms, and Trojan horses
keylogger
Unauthorized access to a computer system to gain restricted information
denial of service
Malware that combines more than one type of malicious program
salami shaving
Unauthorized copying of personal information
identity theft
A type of program that secretly records keystrokes
vandalism
A method for stealing user IDs and passwords
data diddling
Redirecting small, unnoticeable amounts of money from large amounts
information theft
(Matching)
4.7/5
(31)

Data security on a system that is guarded by user IDs and passwords depends on password ____.

(Multiple Choice)
4.8/5
(31)

A keylogger is a program that secretly records your keystrokes.

(True/False)
4.8/5
(35)

  Item 2 in the figure above indicates ____. Item 2 in the figure above indicates ____.

(Multiple Choice)
4.8/5
(42)

A ____ virus infects the system files on your computer causing widespread damage to your hard drive.

(Multiple Choice)
4.8/5
(30)

A ____ is a message containing information about a user sent from a Web server to a browser and stored on the user's hard drive.

(Multiple Choice)
4.7/5
(43)

Which of the following is NOT typically included with a data center?

(Multiple Choice)
4.7/5
(35)

A power ____________________ is a complete loss of power to a computer system.

(Short Answer)
4.9/5
(31)

A local shared object is also called a(n)____.

(Multiple Choice)
5.0/5
(23)
Showing 41 - 60 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)