Exam 11: Computer Security, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

  Figure 11-1 Spim is messages like those in Figure 11-1, but sent via Internet telephony. Figure 11-1 Spim is messages like those in Figure 11-1, but sent via Internet telephony.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

____________________ is a program that restricts access to specified Web sites.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

Web filtering software

Critics contend that the information in an electronic profile reveals more about an individual than anyone has the right to know.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

True

One suggestion to safeguard personal information is to avoid shopping clubs and buyer cards.

(True/False)
4.9/5
(39)

____________________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

(Short Answer)
5.0/5
(32)

An employee using an organization's computer to track his or her child's soccer league scores is an example of unauthorized access.

(True/False)
4.9/5
(26)

A UPS connects between a computer and a ____.

(Multiple Choice)
4.9/5
(32)

Thieves often target notebook computers of company executives, so they can use the stolen computer to access confidential company information illegally.

(True/False)
4.7/5
(41)

  Figure 11-1 ____, like that shown in Figure 11-1, is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Figure 11-1 ____, like that shown in Figure 11-1, is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.

(Multiple Choice)
5.0/5
(28)

  Figure 11-1 To avoid items like that shown in Figure 11-1, users can sign up for ____, which is a service from an Internet service provider that blocks e-mail messages from designated sources. Figure 11-1 To avoid items like that shown in Figure 11-1, users can sign up for ____, which is a service from an Internet service provider that blocks e-mail messages from designated sources.

(Multiple Choice)
5.0/5
(39)

S-HTTP is easier to use than SSL, but it is less secure.

(True/False)
4.9/5
(23)

To prevent repetitive strain injury, take all of the following precautions except ____.

(Multiple Choice)
4.9/5
(31)

During product ____, which is conducted either online or by telephone, users provide a software product's 25-character identification number to receive an installation identification number unique to the computer on which the software is installed.

(Multiple Choice)
4.8/5
(35)

In the case of system failure or the discovery of corrupted files, users ____________________ the files by copying the backed up files to their original location on a computer.

(Short Answer)
4.9/5
(33)

The National Photographers Association believes that allowing even the slightest alteration could lead to misrepresentations in photographs.

(True/False)
4.7/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
A kind of backup policy used to preserve multiple copies of important files.
CAN-SPAM Act
The act of defacing or destroying computer equipment.
surge protector
The inflammation of the nerve that connects the forearm to the palm of the wrist.
plaintext
Correct Answer:
Verified
Premises:
Responses:
A kind of backup policy used to preserve multiple copies of important files.
CAN-SPAM Act
The act of defacing or destroying computer equipment.
surge protector
The inflammation of the nerve that connects the forearm to the palm of the wrist.
plaintext
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
virus hoax
By far the most common form of software theft.
hardware vandalism
The discovery, collection, and analysis of evidence found on computers and networks.
script kiddie
A common infringement of copyright.
computer forensics
Often, this links to a cookie stored on the hard disk.
software piracy
Can include plug-ins for telephone lines and other cables.
password
Protects any tangible form of expression.
CTS
Protects minors from inappropriate content when accessing the Internet in schools and libraries.
antivirus programs
Symptoms include extreme pain that extends from the forearm to the hand, along with tingling in the fingers.
Children's Internet Protection Act
In the encryption process, the encrypted (scrambled) data.
tendonitis
Most systems require that a user selects this on his or her own.
copyright
Can protect against worms and Trojan horses.
third-generation
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
Web bug
Usually does not have advanced computer and technical skills.
license agreement
It fails to define a legitimate business need.
piracy
In the encryption process, the unencrypted, readable data.
Fair Credit Reporting Act
Provides specific conditions for use of software, which a user must accept before using the software.
ciphertext
(Matching)
4.9/5
(38)

Software piracy continues for all of the following reasons except ____.

(Multiple Choice)
4.9/5
(37)

A surge protector absorbs small overvoltages - generally without damage to the computer or equipment.

(True/False)
4.8/5
(41)

  Figure 11-4 Biometric objects, like the one shown in Figure 11-4, often are used in combination with personal identification numbers. Figure 11-4 Biometric objects, like the one shown in Figure 11-4, often are used in combination with personal identification numbers.

(True/False)
4.8/5
(41)

A(n) ____ gives authors and artists exclusive rights to duplicate, publish, and sell their materials.

(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 191
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)