Exam 11: Computer Crime and Information Security
Exam 1: Why Study Computers and Digital Technologies149 Questions
Exam 2: Hardware Designed to Meet the Need148 Questions
Exam 3: Software Solutions for Personal and Professional Gain147 Questions
Exam 4: The Internet and World Wide Web147 Questions
Exam 5: Telecommunications, Wireless Technologies, and Computer Networks148 Questions
Exam 6: Digital Media for Work and Leisure149 Questions
Exam 7: Database Systems147 Questions
Exam 8: E-Commerce149 Questions
Exam 9: Information, Decision Support, and Special-Purpose Systems146 Questions
Exam 10: Systems Development148 Questions
Exam 11: Computer Crime and Information Security150 Questions
Exam 12: Digital Society, Ethics, and Globalization148 Questions
Select questions type
Information security is concerned with three main areas including ____________________, which states that information should be accessible to those who need it when they need it.
(Short Answer)
4.8/5
(30)
Maxwell is fighting several computer viruses that have infected his company. He has started to keep a log of each virus so that he can implement preventative measures in the future.
-The first virus that Maxwell adds to his log is the ____ virus. This virus changes the paths that indicate the location of files on the computer system.
(Multiple Choice)
4.9/5
(34)
The most popular type of devices used to identify users and provide access to restricted areas and computer systems are ____ that sometimes take the form of a keychain fob.
(Multiple Choice)
4.9/5
(31)
Information security is concerned with three main areas including ____________________, which states that information should be modified only by those who are authorized to do so.
(Short Answer)
4.9/5
(47)
User ____ provide registered users with access to the files they need, while restricting access to private resources.
(Multiple Choice)
4.9/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
-When members of a group have access to specific network resources
(Multiple Choice)
4.8/5
(32)
A(n) ____ disk is created while a system is operational and backs up important operating systems files.
(Multiple Choice)
4.9/5
(40)
Researchers estimate that only ____ percent of Wi-Fi users and network administrators take the steps necessary to secure their Wi-Fi network.
(Multiple Choice)
4.9/5
(32)
The Children's Online ____ Protection Act of 1998 gives parents control over what information is collected from their children online and how such information may be used.
(Multiple Choice)
4.9/5
(31)
-The accompanying figure, showing someone with their finger over a red light, is an example of ____ security.

(Multiple Choice)
4.9/5
(42)
____ information security refers to securing all components of the global digital information infrastructure-from cell phones to PCs, to business and government networks, to Internet routers and communications satellites.
(Multiple Choice)
4.8/5
(37)
Research shows that over 75% of computer users have a regular backup procedure in place.
(True/False)
4.8/5
(51)
When a computer is connected to a network, security risks increase a hundredfold.
(True/False)
4.8/5
(44)
Diana Andrews is in charge of keeping e-mail safe for the 400 employees of a mail order company. To increase employee awareness of security threats, Diana sends out a weekly e-zine with helpful updates.
-Diana reminds her readers that ____ is the act of assuming the identity of another.
(Multiple Choice)
4.8/5
(29)
____ software referred to as Windows cleaners, or Windows Registry cleaners, such as CleanMyPC and Registry Mechanic, scan the Windows Registry, correcting incorrect or obsolete information
(Multiple Choice)
4.9/5
(35)
Protection of intellectual property can take many forms, including copyrights, trademarks, trade secrets, and patents. _________________________
(True/False)
4.7/5
(44)
A scary statistic from a study performed by security firm Sophos showed that 40 percent of Internet users use one common password for all their online accounts.
(True/False)
4.9/5
(34)
The Consumer ____ Privacy Protection Act of 1997 requires data collectors to alert people that their personal information is being shared with other organizations.
(Multiple Choice)
4.7/5
(38)
Showing 61 - 80 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)