Exam 11: Computer Crime and Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A ____ is someone who takes advantage of security vulnerabilities to gain unlawful access to private networks for the purpose of private advantage.

(Multiple Choice)
4.8/5
(32)

A(n) ____________________ system is a computer system, such as a computer network, where multiple users share access to resources such as file systems.

(Short Answer)
4.8/5
(38)

A medical office sending lab results to the wrong person is an example of ____.

(Multiple Choice)
4.8/5
(41)

Please name three actions that smart businesses and organizations do to prevent computer-related mistakes.

(Essay)
4.8/5
(31)

The concept of information security is built on the assumption that the information you create, store, maintain, and transfer is ____.

(Multiple Choice)
4.8/5
(39)

Most Wi-Fi networks are centered around a device called a(n) portal point. _________________________

(True/False)
4.8/5
(32)

____________________ property refers to a product of the mind or intellect over which the owner holds legal entitlement.

(Short Answer)
4.8/5
(43)

Bluetooth is the technology behind ____ area networks that allows personal digital devices, like cell phones and headsets, to communicate wirelessly at short distances.

(Multiple Choice)
4.7/5
(46)

The backup software option of backing up just those files that have changed since the last backup is called a(n) ____ backup.

(Multiple Choice)
4.8/5
(39)

____________________ is the science and technology of authentication by scanning and measuring a person's unique physical features such as fingerprints, retinal patterns, and facial characteristics.

(Short Answer)
4.9/5
(26)

People who drive through neighborhoods, looking for unsecured networks, use software such as ____ that probes and scans for networks.

(Multiple Choice)
4.8/5
(39)

____________________ involves taking credit for someone else's intellectual property, typically a written idea, by claiming it as your own.

(Short Answer)
4.9/5
(42)

Identify the letter of the choice that best matches the phrase or definition. -The act of subverting computer security without authorization

(Multiple Choice)
4.8/5
(37)

Identify the letter of the choice that best matches the phrase or definition. -Business intelligence concerned with protecting your information from access by your competitors

(Multiple Choice)
4.9/5
(29)

Social ____________________ exploits the natural human tendency to trust others.

(Short Answer)
4.9/5
(32)

Many attackers use the Microsoft monthly announcements to reverse-engineer hacking tools that take advantage of the newly found bugs.

(True/False)
4.9/5
(35)

Identify the letter of the choice that best matches the phrase or definition. -Business intelligence concerned with information about competitors

(Multiple Choice)
4.9/5
(32)

Diana Andrews is in charge of keeping e-mail safe for the 400 employees of a mail order company. To increase employee awareness of security threats, Diana sends out a weekly e-zine with helpful updates. -Diana also explains that in the criminal act of ____, hackers hijack a domain name service (DNS) server to automatically redirect users from legitimate Web sites to spoofed Web sites in the effort to steal personal information.

(Multiple Choice)
4.8/5
(38)

Los Angeles International Airport reported that on average, ____ laptops per week are lost on its premises.

(Multiple Choice)
4.8/5
(34)

In 2009, President Obama created a new senior-level position in the White House to oversee cybersecurity across all areas of government and national infrastructure.

(True/False)
5.0/5
(37)
Showing 21 - 40 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)