Exam 11: Computer Security, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.

(Short Answer)
4.9/5
(34)

A(n) ____________________ is someone who uses the Internet or network to destroy or damage computers for political reasons.

(Short Answer)
4.9/5
(28)

  Figure 11-4 A(n) ____ object, an example of which is shown in Figure 11-4, is any item that must be carried to gain access to a computer or computer facility. Figure 11-4 A(n) ____ object, an example of which is shown in Figure 11-4, is any item that must be carried to gain access to a computer or computer facility.

(Multiple Choice)
4.8/5
(39)

Users may have ____________________ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.

(Short Answer)
4.8/5
(39)

Computer forensics is used by ____.

(Multiple Choice)
4.7/5
(35)

Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.

(True/False)
4.9/5
(32)

A(n) ____________________ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.

(Short Answer)
4.9/5
(39)

The term ____ refers to online or Internet-based illegal acts.

(Multiple Choice)
4.9/5
(42)

____________________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.

(Short Answer)
4.8/5
(33)

The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.

(Multiple Choice)
4.8/5
(44)

Analog signatures help to prevent e-mail forgery.

(True/False)
4.9/5
(37)

Software ____________________ is the unauthorized and illegal duplication of copyrighted software.

(Short Answer)
4.8/5
(30)

Many companies use access controls to minimize the chance that a hacker may intentionally access or an employee may accidentally access confidential information on a computer.

(True/False)
4.8/5
(47)

  Figure 11-2 Many Web sites, like that in Figure 11-2, require a user to enter a(n) ____________________, which is a unique combination of characters, such as letters of the alphabet or numbers. Figure 11-2 Many Web sites, like that in Figure 11-2, require a user to enter a(n) ____________________, which is a unique combination of characters, such as letters of the alphabet or numbers.

(Short Answer)
4.8/5
(25)

The higher a surge protector's Joule rating, the poorer the protection.

(True/False)
4.7/5
(37)

____ access is the use of a computer or network without permission.

(Multiple Choice)
4.9/5
(42)

____________________ involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.

(Short Answer)
4.8/5
(30)

A ____ is a small text file that a Web server stores on a user's computer.

(Multiple Choice)
4.9/5
(35)

A(n) ____________________ is someone who uses e-mail as a vehicle for extortion.

(Short Answer)
5.0/5
(33)

In addition to access controls, a computer should maintain a(n) ____ trail that records both successful and unsuccessful access attempts.

(Multiple Choice)
4.8/5
(33)
Showing 161 - 180 of 191
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)