Exam 11: Computer Security, Ethics, and Privacy
Exam 1: Introduction to Computers191 Questions
Exam 2: The Internet and World Wide Web191 Questions
Exam 3: Application Software191 Questions
Exam 4: The Components of the System Unit191 Questions
Exam 5: Input181 Questions
Exam 6: Output191 Questions
Exam 7: Storage191 Questions
Exam 8: Operating Systems and Utility Programs191 Questions
Exam 9: Communications and Networks181 Questions
Exam 10: Database Management191 Questions
Exam 11: Computer Security, Ethics, and Privacy191 Questions
Exam 12: Information System Development191 Questions
Exam 13: Programming Languages and Program Development191 Questions
Exam 14: Enterprise Computing191 Questions
Exam 15: Computer Careers and Certification191 Questions
Select questions type
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
(Multiple Choice)
4.9/5
(43)
____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.
(Multiple Choice)
4.8/5
(35)
Many browsers offer 56 -bit encryption, which is a higher level of protection than 40-bit encryption because it has a longer encryption key.
(True/False)
5.0/5
(38)
____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
(Multiple Choice)
4.9/5
(38)
Biometric devices are losing popularity as a security precaution because they are an easily fooled method of identification and authentication.
(True/False)
4.9/5
(35)
Some browsers offer a protection level known as 40-bit encryption.
(True/False)
4.9/5
(26)
A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security.
(True/False)
4.9/5
(40)
Each character added to a password significantly ____ it might take for someone or for a hacker's computer to guess the password.
(Multiple Choice)
4.9/5
(38)
A(n) ____________________ is a numeric password either assigned by a company or selected by a user.
(Short Answer)
4.8/5
(44)
With a three-generation backup policy, the parent is the ____.
(Multiple Choice)
4.9/5
(31)
Computer viruses, worms, and Trojan horses are classified as ____________________, which are programs that act without a user's knowledge and deliberately alter the computer's operations.
(Short Answer)
4.7/5
(36)
Critical Thinking Questions Case 1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. All of the following are permissible under a EULA except which of the following?
(Multiple Choice)
4.9/5
(32)
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
(Multiple Choice)
4.8/5
(36)
A(n) ____________________ is a company or person a user believes will not send a virus-infected file knowingly.
(Short Answer)
5.0/5
(34)
A(n) ____ server is a server outside a company's network that controls which communications pass into the company's network.
(Multiple Choice)
4.8/5
(35)
____________________ are the rights to which creators are entitled for their work.
(Short Answer)
4.9/5
(29)
The computer that a hacker uses to execute a DoS or DDoS attack, known as a ____, is completely unaware that it is being used to attack other systems.
(Multiple Choice)
4.7/5
(37)
One of the more common causes of ____ is an electrical power variation.
(Multiple Choice)
4.8/5
(32)
Showing 101 - 120 of 191
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)