Exam 11: Computer Crime and Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The U.S. Federal ____________________ Commission breaks down identity theft into several subcategories of fraud based on how the stolen identity is used.

(Short Answer)
4.7/5
(33)

A ____ protects all the ports of a network or PC from intruders and guards against known methods of attack.

(Multiple Choice)
5.0/5
(31)

Identify the letter of the choice that best matches the phrase or definition. -Identifies a user to the computer system

(Multiple Choice)
4.8/5
(36)

The defragmentation utility provided with your operating system or purchased separately can be used to defragment your ____________________, aligning your files in adjacent clusters and improving your computer's performance.

(Short Answer)
4.7/5
(33)

Fingerprint scans are becoming a less and less common method of authentication for access to secure areas.

(True/False)
4.9/5
(50)

A(n) firewall is network hardware or software that examines all incoming packets and filters out packets that are potentially dangerous. _________________________

(True/False)
4.8/5
(36)

____ driving is the act of driving through neighborhoods with a wireless notebook or handheld computer and looking for unsecured Wi-Fi networks.

(Multiple Choice)
4.8/5
(34)

The backup software option of backing up all files is called a ____ backup.

(Multiple Choice)
4.8/5
(36)

In distributed denial-of-service attacks, many computers are used to launch simultaneous repeated requests at a Web server in order to overwhelm it so that it is unable to function. _________________________

(True/False)
4.8/5
(40)

Threats from within a private network are often referred to as ____ threats.

(Multiple Choice)
4.9/5
(37)

Employers are legally responsible for notifying employees of network usage policies.

(True/False)
4.9/5
(37)

Identify the letter of the choice that best matches the phrase or definition. -Information that identifies a file's creator

(Multiple Choice)
5.0/5
(43)

A ____ is a person with little technical knowledge who follows the instructions of others to hack networks.

(Multiple Choice)
4.7/5
(39)

The Sarbanes-Oakley Act of 2002 fights corporate corruption by imposing stringent reporting requirements and internal controls on electronic financial records and transactions. _________________________

(True/False)
4.7/5
(39)

Computer forensics is the process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities. _________________________

(True/False)
4.9/5
(33)

Recently, the RIAA has changed strategies from having music fans cut off from the Internet, to suing them instead.

(True/False)
4.9/5
(37)

Identify the letter of the choice that best matches the phrase or definition. -Access privileges afforded to each network user

(Multiple Choice)
5.0/5
(38)

Cameras posted at airport security gates and on city streets can continuously scan for faces of known criminals.

(True/False)
4.9/5
(32)

The 2008 Computer Security Institute's Computer Crime and Security survey found that ____ percent of businesses suffer targeted attacks from hackers.

(Multiple Choice)
4.7/5
(35)

Today's virus scanners are programmed to detect hundreds of thousands of different viruses, worms, Trojan horses, and other potentially unwanted applications. _________________________

(True/False)
4.9/5
(34)
Showing 41 - 60 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)