Exam 11: Computer Crime and Information Security
Exam 1: Why Study Computers and Digital Technologies149 Questions
Exam 2: Hardware Designed to Meet the Need148 Questions
Exam 3: Software Solutions for Personal and Professional Gain147 Questions
Exam 4: The Internet and World Wide Web147 Questions
Exam 5: Telecommunications, Wireless Technologies, and Computer Networks148 Questions
Exam 6: Digital Media for Work and Leisure149 Questions
Exam 7: Database Systems147 Questions
Exam 8: E-Commerce149 Questions
Exam 9: Information, Decision Support, and Special-Purpose Systems146 Questions
Exam 10: Systems Development148 Questions
Exam 11: Computer Crime and Information Security150 Questions
Exam 12: Digital Society, Ethics, and Globalization148 Questions
Select questions type
You can adjust file permissions for a specific file or folder by accessing the file properties (____ and choose Properties in Windows).
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
A
____________________ involves the illegal copying, use, and distribution of digital intellectual property such as software, music, and movies.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Piracy
A hacker could type in SQL commands into a Web form, rather than customer information, to take control of the database. This type of attack is referred to as SQL ____.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
B
A hacker can remotely install ____________________ software on a computer to record all keystrokes and commands.
(Short Answer)
4.7/5
(33)
A ____ protects a unique symbol or word used by a business to identify a product or service.
(Multiple Choice)
4.8/5
(34)
The ____ of 1996 requires those in the health industry to protect the privacy of health information and provides policies and procedures for doing so.
(Multiple Choice)
4.8/5
(42)
Speech recognition, also called speaker authentication, identifies a user by the sound of his or her voice. _________________________
(True/False)
4.8/5
(46)
The digitization of many forms of intellectual property, including books, movies, artwork, and music, has transformed intangible products into tangible products.
(True/False)
4.8/5
(29)
A(n) ____ does not attach itself to other programs but rather acts as a free agent, replicating itself numerous times in an effort to overwhelm systems.
(Multiple Choice)
4.7/5
(37)
A person neglecting to properly set the necessary security settings to secure a home wireless network is an example of ____.
(Multiple Choice)
4.8/5
(30)
Retinal scanning analyzes the pattern of blood vessels at the back of the eye. _________________________
(True/False)
4.7/5
(30)
Diana Andrews is in charge of keeping e-mail safe for the 400 employees of a mail order company. To increase employee awareness of security threats, Diana sends out a weekly e-zine with helpful updates.
-Diana also includes a warning about a ____, which is an e-mail that warns of a virus that doesn't exist.
(Multiple Choice)
4.8/5
(35)
JoAnn is writing a paper on malicious spyware for her Mass Media and the Internet class. She has just started her first draft of the paper.
-JoAnn opens the paper with a definition of ____, which is software installed on a computer without the user's knowledge to either monitor the user or allow an outside party to control the computer.
(Multiple Choice)
4.9/5
(40)
Apple Mac OS X Leopard provides a similar tool to Microsoft's System Restore called ____________________.
(Short Answer)
4.8/5
(30)
-The accompanying figure, showing someone with a white card, is an example of ____ security.

(Multiple Choice)
4.9/5
(48)
Intellectual property ____________________ concern the ownership and use of intellectual property such as software, music, movies, data, and information.
(Short Answer)
4.9/5
(45)
Microsoft has, in the past, extended a hand to the hacking community, hoping to get black-hat hackers on its side. _________________________
(True/False)
4.7/5
(32)
Maxwell is fighting several computer viruses that have infected his company. He has started to keep a log of each virus so that he can implement preventative measures in the future.
-The last type of virus that Maxwell adds to his log is the ____ virus. This virus infects a computer's startup program so that the virus becomes active as soon as the computer starts up.
(Multiple Choice)
4.7/5
(28)
Hackers use packet-____ software to steal private data being transported over a network.
(Multiple Choice)
4.8/5
(34)
Some Windows PCs include an embedded security subsystem that stores passwords and encryption keys on a dedicated security chip on the ____________________.
(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)