Exam 11: Computer Security, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Internet advertising firms often use ____ to collect information about users Web browsing habits.

(Multiple Choice)
4.8/5
(41)

A(n) ____________________ is a Web site that automatically backs up files to its online location.

(Short Answer)
5.0/5
(45)

A brownout is a complete power failure.

(True/False)
4.8/5
(35)

Describe botnets and denial of service attacks.

(Essay)
4.8/5
(39)

A ____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action.

(Multiple Choice)
4.8/5
(34)

____________________ occurs when someone steals personal or confidential information.

(Short Answer)
4.8/5
(37)

____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.

(Multiple Choice)
5.0/5
(32)

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

(True/False)
4.8/5
(35)

A ____ is a separate area of a hard disk that holds an infected file until the infection can be removed.

(Multiple Choice)
4.8/5
(39)

A(n) ____ agreement is the right to use software.

(Multiple Choice)
4.8/5
(31)

A ____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.

(Multiple Choice)
4.8/5
(31)
Showing 181 - 191 of 191
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)