Exam 11: Computer Crime and Information Security
Exam 1: Why Study Computers and Digital Technologies149 Questions
Exam 2: Hardware Designed to Meet the Need148 Questions
Exam 3: Software Solutions for Personal and Professional Gain147 Questions
Exam 4: The Internet and World Wide Web147 Questions
Exam 5: Telecommunications, Wireless Technologies, and Computer Networks148 Questions
Exam 6: Digital Media for Work and Leisure149 Questions
Exam 7: Database Systems147 Questions
Exam 8: E-Commerce149 Questions
Exam 9: Information, Decision Support, and Special-Purpose Systems146 Questions
Exam 10: Systems Development148 Questions
Exam 11: Computer Crime and Information Security150 Questions
Exam 12: Digital Society, Ethics, and Globalization148 Questions
Select questions type
A ____ is someone who takes advantage of security vulnerabilities to gain unlawful access to private networks for the purpose of private advantage.
(Multiple Choice)
4.8/5
(32)
A(n) ____________________ system is a computer system, such as a computer network, where multiple users share access to resources such as file systems.
(Short Answer)
4.8/5
(38)
A medical office sending lab results to the wrong person is an example of ____.
(Multiple Choice)
4.8/5
(41)
Please name three actions that smart businesses and organizations do to prevent computer-related mistakes.
(Essay)
4.8/5
(31)
The concept of information security is built on the assumption that the information you create, store, maintain, and transfer is ____.
(Multiple Choice)
4.8/5
(39)
Most Wi-Fi networks are centered around a device called a(n) portal point. _________________________
(True/False)
4.8/5
(32)
____________________ property refers to a product of the mind or intellect over which the owner holds legal entitlement.
(Short Answer)
4.8/5
(43)
Bluetooth is the technology behind ____ area networks that allows personal digital devices, like cell phones and headsets, to communicate wirelessly at short distances.
(Multiple Choice)
4.7/5
(46)
The backup software option of backing up just those files that have changed since the last backup is called a(n) ____ backup.
(Multiple Choice)
4.8/5
(39)
____________________ is the science and technology of authentication by scanning and measuring a person's unique physical features such as fingerprints, retinal patterns, and facial characteristics.
(Short Answer)
4.9/5
(26)
People who drive through neighborhoods, looking for unsecured networks, use software such as ____ that probes and scans for networks.
(Multiple Choice)
4.8/5
(39)
____________________ involves taking credit for someone else's intellectual property, typically a written idea, by claiming it as your own.
(Short Answer)
4.9/5
(42)
Identify the letter of the choice that best matches the phrase or definition.
-The act of subverting computer security without authorization
(Multiple Choice)
4.8/5
(37)
Identify the letter of the choice that best matches the phrase or definition.
-Business intelligence concerned with protecting your information from access by your competitors
(Multiple Choice)
4.9/5
(29)
Social ____________________ exploits the natural human tendency to trust others.
(Short Answer)
4.9/5
(32)
Many attackers use the Microsoft monthly announcements to reverse-engineer hacking tools that take advantage of the newly found bugs.
(True/False)
4.9/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
-Business intelligence concerned with information about competitors
(Multiple Choice)
4.9/5
(32)
Diana Andrews is in charge of keeping e-mail safe for the 400 employees of a mail order company. To increase employee awareness of security threats, Diana sends out a weekly e-zine with helpful updates.
-Diana also explains that in the criminal act of ____, hackers hijack a domain name service (DNS) server to automatically redirect users from legitimate Web sites to spoofed Web sites in the effort to steal personal information.
(Multiple Choice)
4.8/5
(38)
Los Angeles International Airport reported that on average, ____ laptops per week are lost on its premises.
(Multiple Choice)
4.8/5
(34)
In 2009, President Obama created a new senior-level position in the White House to oversee cybersecurity across all areas of government and national infrastructure.
(True/False)
5.0/5
(37)
Showing 21 - 40 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)