Exam 11: Computer Crime and Information Security
Exam 1: Why Study Computers and Digital Technologies149 Questions
Exam 2: Hardware Designed to Meet the Need148 Questions
Exam 3: Software Solutions for Personal and Professional Gain147 Questions
Exam 4: The Internet and World Wide Web147 Questions
Exam 5: Telecommunications, Wireless Technologies, and Computer Networks148 Questions
Exam 6: Digital Media for Work and Leisure149 Questions
Exam 7: Database Systems147 Questions
Exam 8: E-Commerce149 Questions
Exam 9: Information, Decision Support, and Special-Purpose Systems146 Questions
Exam 10: Systems Development148 Questions
Exam 11: Computer Crime and Information Security150 Questions
Exam 12: Digital Society, Ethics, and Globalization148 Questions
Select questions type
A ____ protects the words, music, and other expressions for the life of the holder plus 70 years.
(Multiple Choice)
4.8/5
(39)
Like tangible objects, intellectual property has value and is owned by an individual or organization.
(True/False)
4.9/5
(36)
Identify the letter of the choice that best matches the phrase or definition.
-Combination of characters known only to the user that is used for authentication
(Multiple Choice)
4.8/5
(35)
Microsoft Windows Vista uses three classifications for user accounts that do NOT include ____.
(Multiple Choice)
4.9/5
(36)
The 2008 Computer Security Institute's Computer Crime and Security survey found that ____ percent of businesses experience computer virus infestations.
(Multiple Choice)
4.7/5
(37)
A military commander entering the wrong GPS coordinates for enemy troops into the computer is an example of ____.
(Multiple Choice)
4.8/5
(43)
Software ____ are corrections to the software bugs that cause security vulnerabilities.
(Multiple Choice)
4.8/5
(42)
Maxwell is fighting several computer viruses that have infected his company. He has started to keep a log of each virus so that he can implement preventative measures in the future.
-Next Maxwell logs the ____ virus, which deletes information contained in the files that it infects, rendering them partially or totally useless.
(Multiple Choice)
4.8/5
(34)
A security and network ____ is a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources.
(Multiple Choice)
4.9/5
(38)
Social-terrorism is a form of terrorism that uses attacks over the Internet to intimidate and harm a population. _________________________
(True/False)
4.9/5
(40)
An attack called a ____ download places enticing links on Web pages that when clicked run a Web script that infects the visitor's PC.
(Multiple Choice)
4.7/5
(41)
War ____ is the activity of hacking into Bluetooth networks.
(Multiple Choice)
4.7/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
-When system resources are available to everyone on the network
(Multiple Choice)
4.8/5
(36)
A ____ is someone who considers it working for the common good to hack into networks in order to call attention to flaws in security so that they can be fixed.
(Multiple Choice)
4.7/5
(34)
A ____ protects an invention by giving the holder a monopoly on the use of the invention for 20 years after the application has been applied.
(Multiple Choice)
4.8/5
(36)
JoAnn is writing a paper on malicious spyware for her Mass Media and the Internet class. She has just started her first draft of the paper.
-JoAnn follows up her intro with a description of a(n) ____ computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus.
(Multiple Choice)
4.7/5
(35)
The ____ Industry Association of America (RIAA) has sued thousands of individuals involved in illegal MP3 file sharing for significant financial settlements.
(Multiple Choice)
4.8/5
(41)
The 2008 Computer Security Institute's Computer Crime and Security survey found that ____ percent of businesses suffer from electronic financial fraud.
(Multiple Choice)
4.9/5
(37)
When sending confidential information over the Internet, make sure the browser is using a secure connection, indicated by the https:// in the address bar and the ____ icon at the bottom of the browser screen.
(Multiple Choice)
4.9/5
(42)
Showing 81 - 100 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)