Exam 11: Computer Crime and Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

By default, access points are set to broadcast their presence.

(True/False)
4.8/5
(35)

Information security is concerned with three main areas including ____________________, which states that information should be accessible to those who need it when they need it.

(Short Answer)
4.8/5
(30)

Maxwell is fighting several computer viruses that have infected his company. He has started to keep a log of each virus so that he can implement preventative measures in the future. -The first virus that Maxwell adds to his log is the ____ virus. This virus changes the paths that indicate the location of files on the computer system.

(Multiple Choice)
4.9/5
(34)

The most popular type of devices used to identify users and provide access to restricted areas and computer systems are ____ that sometimes take the form of a keychain fob.

(Multiple Choice)
4.9/5
(31)

Information security is concerned with three main areas including ____________________, which states that information should be modified only by those who are authorized to do so.

(Short Answer)
4.9/5
(47)

User ____ provide registered users with access to the files they need, while restricting access to private resources.

(Multiple Choice)
4.9/5
(35)

Identify the letter of the choice that best matches the phrase or definition. -When members of a group have access to specific network resources

(Multiple Choice)
4.8/5
(32)

A(n) ____ disk is created while a system is operational and backs up important operating systems files.

(Multiple Choice)
4.9/5
(40)

Researchers estimate that only ____ percent of Wi-Fi users and network administrators take the steps necessary to secure their Wi-Fi network.

(Multiple Choice)
4.9/5
(32)

The Children's Online ____ Protection Act of 1998 gives parents control over what information is collected from their children online and how such information may be used.

(Multiple Choice)
4.9/5
(31)

  -The accompanying figure, showing someone with their finger over a red light, is an example of ____ security. -The accompanying figure, showing someone with their finger over a red light, is an example of ____ security.

(Multiple Choice)
4.9/5
(42)

____ information security refers to securing all components of the global digital information infrastructure-from cell phones to PCs, to business and government networks, to Internet routers and communications satellites.

(Multiple Choice)
4.8/5
(37)

Research shows that over 75% of computer users have a regular backup procedure in place.

(True/False)
4.8/5
(51)

When a computer is connected to a network, security risks increase a hundredfold.

(True/False)
4.8/5
(44)

Diana Andrews is in charge of keeping e-mail safe for the 400 employees of a mail order company. To increase employee awareness of security threats, Diana sends out a weekly e-zine with helpful updates. -Diana reminds her readers that ____ is the act of assuming the identity of another.

(Multiple Choice)
4.8/5
(29)

____ software referred to as Windows cleaners, or Windows Registry cleaners, such as CleanMyPC and Registry Mechanic, scan the Windows Registry, correcting incorrect or obsolete information

(Multiple Choice)
4.9/5
(35)

Protection of intellectual property can take many forms, including copyrights, trademarks, trade secrets, and patents. _________________________

(True/False)
4.7/5
(44)

A scary statistic from a study performed by security firm Sophos showed that 40 percent of Internet users use one common password for all their online accounts.

(True/False)
4.9/5
(34)

The Consumer ____ Privacy Protection Act of 1997 requires data collectors to alert people that their personal information is being shared with other organizations.

(Multiple Choice)
4.7/5
(38)

All hackers are considered unethical.

(True/False)
4.8/5
(30)
Showing 61 - 80 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)