Exam 31: Security, Privacy, and Ethics Online

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A certificate for sites that process sensitive data.
Responses:
FTC
Firewall
TLS
Correct Answer:
Verified
Premises:
Responses:
A certificate for sites that process sensitive data.
FTC
Free
(Matching)
4.8/5
(34)
Correct Answer:
Verified

Which of the following is NOT a guideline for using network protection?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

D

Generally, any information gathered from a company's computer system is company property and not an individual worker's personal property.

Free
(True/False)
5.0/5
(25)
Correct Answer:
Verified

True

A brute force attack is also called a dictionary attack.

(True/False)
4.7/5
(34)

Typical phishing messages come from social networking sites, auction sites, banks, and the IRS.

(True/False)
4.9/5
(32)

Joanna is a responsible and secure computer user. Joanna knows that all of the following are TRUE about securing data, EXCEPT: ____.

(Multiple Choice)
4.8/5
(41)

A(n) ____ is a malicious program that records your keystrokes to keep track of the information such as credit card and account numbers.

(Multiple Choice)
4.8/5
(40)

You should store your backup files near the computer so they will be accessible in case your hard drive fails.

(True/False)
4.8/5
(39)

When using a notebook computer, put it on your lap for stability.

(True/False)
4.7/5
(37)

A(n) ____________________ can be used to provide the Web site owner with information about you and your computer.

(Short Answer)
4.7/5
(31)

____ attacks use a script or program to log on to an account using hundreds of words or phrases stored in a file.

(Multiple Choice)
4.8/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A network security feature.
Responses:
Firewall
TLS
FTC
Correct Answer:
Verified
Premises:
Responses:
A network security feature.
Firewall
(Matching)
4.9/5
(28)

A(n) ____ is usually a battery that provides power if the normal current is disrupted.

(Multiple Choice)
4.8/5
(27)

Unauthorized use of an unsecured wireless network can slow down your Internet access.

(True/False)
4.8/5
(35)

GoDaddy is a site that provides ____.

(Multiple Choice)
4.8/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An agency that offers guidelines to make sure your e-commerce transactions are secure.
Responses:
Firewall
FTC
Private key
Correct Answer:
Verified
Premises:
Responses:
An agency that offers guidelines to make sure your e-commerce transactions are secure.
Firewall
(Matching)
4.9/5
(33)

What effect can an unexpected power outage have on your data? What to most software programs do to prevent data loss? List two things you can use to safeguard computer systems against power outages. What does backing up entail? What priority should your backup procedure have?

(Essay)
4.9/5
(34)

A software firewall is more secure and easier to monitor for large networks.

(True/False)
4.7/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Decrypts information.
Responses:
Public key
Private key
Firewall
Correct Answer:
Verified
Premises:
Responses:
Decrypts information.
Public key
(Matching)
4.7/5
(46)

Windows Defender is an example of antivirus software.

(True/False)
4.9/5
(38)
Showing 1 - 20 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)