Exam 11: Computer Security, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk.

(True/False)
4.9/5
(34)

Discuss what a virus is and related examples of malware, and include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Also discuss the symptoms of a computer's having been infected with a virus.

(Essay)
4.8/5
(39)

Explain at least three safeguards you can use to improve the security of wireless networks.

(Essay)
4.8/5
(25)

  Figure 11-3 As shown in Figure 11-3, a(n) ____________________ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Figure 11-3 As shown in Figure 11-3, a(n) ____________________ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

(Short Answer)
4.8/5
(30)

____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.

(Multiple Choice)
4.9/5
(40)

The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.

(Multiple Choice)
4.8/5
(35)

Online backup is not practical for users with high-speed Internet connections.

(True/False)
4.9/5
(33)

A honeypot is a program designed to ____.

(Multiple Choice)
4.9/5
(41)

Some viruses are hidden in ____, which are instructions saved in an application such as a word processing or spreadsheet program.

(Multiple Choice)
4.9/5
(40)

____________________ are the moral guidelines that govern the use of computers and information systems.

(Short Answer)
5.0/5
(35)

____________________ is a program placed on a computer without the user's knowledge that secretly collects information about the user.

(Short Answer)
4.8/5
(32)

A computer ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.

(Multiple Choice)
4.9/5
(24)

Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.

(Multiple Choice)
4.8/5
(35)

The most common type of license included with software purchased by individual users is a(n) ____.

(Multiple Choice)
4.8/5
(42)

A Web site that uses encryption techniques to secure its data is known as a(n) ____ site.

(Multiple Choice)
4.9/5
(34)

A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.

(Multiple Choice)
4.8/5
(31)

  Figure 11-3 To ____ a program file, a program like the one in Figure 11-3 records information such as the file size and file creation date in a separate file. Figure 11-3 To ____ a program file, a program like the one in Figure 11-3 records information such as the file size and file creation date in a separate file.

(Multiple Choice)
4.9/5
(36)

Content ____ is the process of restricting access to certain material on the Web.

(Multiple Choice)
4.8/5
(39)

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

(Essay)
4.8/5
(41)

Some notebook computers use ____ as methods of security.

(Multiple Choice)
4.8/5
(30)
Showing 61 - 80 of 191
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)