Exam 11: Computer Crime and Information Security
Exam 1: Why Study Computers and Digital Technologies149 Questions
Exam 2: Hardware Designed to Meet the Need148 Questions
Exam 3: Software Solutions for Personal and Professional Gain147 Questions
Exam 4: The Internet and World Wide Web147 Questions
Exam 5: Telecommunications, Wireless Technologies, and Computer Networks148 Questions
Exam 6: Digital Media for Work and Leisure149 Questions
Exam 7: Database Systems147 Questions
Exam 8: E-Commerce149 Questions
Exam 9: Information, Decision Support, and Special-Purpose Systems146 Questions
Exam 10: Systems Development148 Questions
Exam 11: Computer Crime and Information Security150 Questions
Exam 12: Digital Society, Ethics, and Globalization148 Questions
Select questions type
The U.S. Federal ____________________ Commission breaks down identity theft into several subcategories of fraud based on how the stolen identity is used.
(Short Answer)
4.7/5
(33)
A ____ protects all the ports of a network or PC from intruders and guards against known methods of attack.
(Multiple Choice)
5.0/5
(31)
Identify the letter of the choice that best matches the phrase or definition.
-Identifies a user to the computer system
(Multiple Choice)
4.8/5
(36)
The defragmentation utility provided with your operating system or purchased separately can be used to defragment your ____________________, aligning your files in adjacent clusters and improving your computer's performance.
(Short Answer)
4.7/5
(33)
Fingerprint scans are becoming a less and less common method of authentication for access to secure areas.
(True/False)
4.9/5
(50)
A(n) firewall is network hardware or software that examines all incoming packets and filters out packets that are potentially dangerous. _________________________
(True/False)
4.8/5
(36)
____ driving is the act of driving through neighborhoods with a wireless notebook or handheld computer and looking for unsecured Wi-Fi networks.
(Multiple Choice)
4.8/5
(34)
The backup software option of backing up all files is called a ____ backup.
(Multiple Choice)
4.8/5
(36)
In distributed denial-of-service attacks, many computers are used to launch simultaneous repeated requests at a Web server in order to overwhelm it so that it is unable to function. _________________________
(True/False)
4.8/5
(40)
Threats from within a private network are often referred to as ____ threats.
(Multiple Choice)
4.9/5
(37)
Employers are legally responsible for notifying employees of network usage policies.
(True/False)
4.9/5
(37)
Identify the letter of the choice that best matches the phrase or definition.
-Information that identifies a file's creator
(Multiple Choice)
5.0/5
(43)
A ____ is a person with little technical knowledge who follows the instructions of others to hack networks.
(Multiple Choice)
4.7/5
(39)
The Sarbanes-Oakley Act of 2002 fights corporate corruption by imposing stringent reporting requirements and internal controls on electronic financial records and transactions. _________________________
(True/False)
4.7/5
(39)
Computer forensics is the process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities. _________________________
(True/False)
4.9/5
(33)
Recently, the RIAA has changed strategies from having music fans cut off from the Internet, to suing them instead.
(True/False)
4.9/5
(37)
Identify the letter of the choice that best matches the phrase or definition.
-Access privileges afforded to each network user
(Multiple Choice)
5.0/5
(38)
Cameras posted at airport security gates and on city streets can continuously scan for faces of known criminals.
(True/False)
4.9/5
(32)
The 2008 Computer Security Institute's Computer Crime and Security survey found that ____ percent of businesses suffer targeted attacks from hackers.
(Multiple Choice)
4.7/5
(35)
Today's virus scanners are programmed to detect hundreds of thousands of different viruses, worms, Trojan horses, and other potentially unwanted applications. _________________________
(True/False)
4.9/5
(34)
Showing 41 - 60 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)