Exam 11: Computer Crime and Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

You can adjust file permissions for a specific file or folder by accessing the file properties (____ and choose Properties in Windows).

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

A

____________________ involves the illegal copying, use, and distribution of digital intellectual property such as software, music, and movies.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

Piracy

A hacker could type in SQL commands into a Web form, rather than customer information, to take control of the database. This type of attack is referred to as SQL ____.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

B

A hacker can remotely install ____________________ software on a computer to record all keystrokes and commands.

(Short Answer)
4.7/5
(33)

A ____ protects a unique symbol or word used by a business to identify a product or service.

(Multiple Choice)
4.8/5
(34)

The ____ of 1996 requires those in the health industry to protect the privacy of health information and provides policies and procedures for doing so.

(Multiple Choice)
4.8/5
(42)

Speech recognition, also called speaker authentication, identifies a user by the sound of his or her voice. _________________________

(True/False)
4.8/5
(46)

The digitization of many forms of intellectual property, including books, movies, artwork, and music, has transformed intangible products into tangible products.

(True/False)
4.8/5
(29)

A(n) ____ does not attach itself to other programs but rather acts as a free agent, replicating itself numerous times in an effort to overwhelm systems.

(Multiple Choice)
4.7/5
(37)

A person neglecting to properly set the necessary security settings to secure a home wireless network is an example of ____.

(Multiple Choice)
4.8/5
(30)

Retinal scanning analyzes the pattern of blood vessels at the back of the eye. _________________________

(True/False)
4.7/5
(30)

Diana Andrews is in charge of keeping e-mail safe for the 400 employees of a mail order company. To increase employee awareness of security threats, Diana sends out a weekly e-zine with helpful updates. -Diana also includes a warning about a ____, which is an e-mail that warns of a virus that doesn't exist.

(Multiple Choice)
4.8/5
(35)

JoAnn is writing a paper on malicious spyware for her Mass Media and the Internet class. She has just started her first draft of the paper. -JoAnn opens the paper with a definition of ____, which is software installed on a computer without the user's knowledge to either monitor the user or allow an outside party to control the computer.

(Multiple Choice)
4.9/5
(40)

Apple Mac OS X Leopard provides a similar tool to Microsoft's System Restore called ____________________.

(Short Answer)
4.8/5
(30)

  -The accompanying figure, showing someone with a white card, is an example of ____ security. -The accompanying figure, showing someone with a white card, is an example of ____ security.

(Multiple Choice)
4.9/5
(48)

Intellectual property ____________________ concern the ownership and use of intellectual property such as software, music, movies, data, and information.

(Short Answer)
4.9/5
(45)

Microsoft has, in the past, extended a hand to the hacking community, hoping to get black-hat hackers on its side. _________________________

(True/False)
4.7/5
(32)

Maxwell is fighting several computer viruses that have infected his company. He has started to keep a log of each virus so that he can implement preventative measures in the future. -The last type of virus that Maxwell adds to his log is the ____ virus. This virus infects a computer's startup program so that the virus becomes active as soon as the computer starts up.

(Multiple Choice)
4.7/5
(28)

Hackers use packet-____ software to steal private data being transported over a network.

(Multiple Choice)
4.8/5
(34)

Some Windows PCs include an embedded security subsystem that stores passwords and encryption keys on a dedicated security chip on the ____________________.

(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)