Exam 11: Computer Security, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hardware theft is the act of stealing computer equipment.

(True/False)
4.9/5
(32)

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.

(Multiple Choice)
4.9/5
(43)

____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.

(Multiple Choice)
4.8/5
(35)

Many browsers offer 56 -bit encryption, which is a higher level of protection than 40-bit encryption because it has a longer encryption key.

(True/False)
5.0/5
(38)

____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.

(Multiple Choice)
4.9/5
(38)

Biometric devices are losing popularity as a security precaution because they are an easily fooled method of identification and authentication.

(True/False)
4.9/5
(35)

Some browsers offer a protection level known as 40-bit encryption.

(True/False)
4.9/5
(26)

A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security.

(True/False)
4.9/5
(40)

Each character added to a password significantly ____ it might take for someone or for a hacker's computer to guess the password.

(Multiple Choice)
4.9/5
(38)

A(n) ____________________ is a numeric password either assigned by a company or selected by a user.

(Short Answer)
4.8/5
(44)

With a three-generation backup policy, the parent is the ____.

(Multiple Choice)
4.9/5
(31)

Computer viruses, worms, and Trojan horses are classified as ____________________, which are programs that act without a user's knowledge and deliberately alter the computer's operations.

(Short Answer)
4.7/5
(36)

Critical Thinking Questions Case 1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. All of the following are permissible under a EULA except which of the following?

(Multiple Choice)
4.9/5
(32)

Personal computers, display devices, and printers should comply with guidelines of the ____ program.

(Multiple Choice)
4.8/5
(36)

A(n) ____________________ is a company or person a user believes will not send a virus-infected file knowingly.

(Short Answer)
5.0/5
(34)

A(n) ____ server is a server outside a company's network that controls which communications pass into the company's network.

(Multiple Choice)
4.8/5
(35)

____________________ are the rights to which creators are entitled for their work.

(Short Answer)
4.9/5
(29)

The computer that a hacker uses to execute a DoS or DDoS attack, known as a ____, is completely unaware that it is being used to attack other systems.

(Multiple Choice)
4.7/5
(37)

Discuss the three types of software theft.

(Essay)
4.9/5
(38)

One of the more common causes of ____ is an electrical power variation.

(Multiple Choice)
4.8/5
(32)
Showing 101 - 120 of 191
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)