Exam 11: Computer Crime and Information Security
Exam 1: Why Study Computers and Digital Technologies149 Questions
Exam 2: Hardware Designed to Meet the Need148 Questions
Exam 3: Software Solutions for Personal and Professional Gain147 Questions
Exam 4: The Internet and World Wide Web147 Questions
Exam 5: Telecommunications, Wireless Technologies, and Computer Networks148 Questions
Exam 6: Digital Media for Work and Leisure149 Questions
Exam 7: Database Systems147 Questions
Exam 8: E-Commerce149 Questions
Exam 9: Information, Decision Support, and Special-Purpose Systems146 Questions
Exam 10: Systems Development148 Questions
Exam 11: Computer Crime and Information Security150 Questions
Exam 12: Digital Society, Ethics, and Globalization148 Questions
Select questions type
____ software uses several techniques to find viruses on a computer system, remove them if possible, and keep additional viruses from infecting the system.
(Multiple Choice)
4.9/5
(31)
On the Internet everyone is just a number-an ____ protocol address such as 128.186.88.100.
(Multiple Choice)
4.9/5
(43)
A ____ is a logical address used by clients and servers that is associated with a specific service.
(Multiple Choice)
4.8/5
(31)
For random attacks, an attacker may employ port-scanning software to search random ____ for open ports.
(Multiple Choice)
4.9/5
(41)
What is computer housecleaning? Name four things that you could do to houseclean your computer.
(Essay)
4.9/5
(42)
With remote data backups, changes to your hard drive are ____ and transmitted via your Internet connection to remote data centers.
(Multiple Choice)
4.9/5
(45)
Identify the letter of the choice that best matches the phrase or definition.
-Hacker who breaks the law
(Multiple Choice)
4.9/5
(33)
Windows PC users who find their system damaged but are still able to start the computer can benefit from the System ____ utility.
(Multiple Choice)
4.9/5
(36)
Information security is concerned with three main areas including ____________________, which states that information should be available only to those who rightfully have access to it.
(Short Answer)
4.8/5
(34)
The ____________________ is typically the only user who has full access to the system.
(Short Answer)
4.9/5
(32)
Protection of ____ property can take many forms, including copyrights, trademarks, trade secrets, and patents.
(Multiple Choice)
4.7/5
(39)
About ____ percent of data loss is attributed to software corruption.
(Multiple Choice)
4.7/5
(36)
Gramm-Leach-Bliley Act (GLBA) of ____ requires banks and financial institutions to alert customers to their policies and practices in disclosing customer information.
(Multiple Choice)
4.9/5
(36)
____________________ is the criminal act of using stolen information about a person to assume that person's identity, typically for financial gain.
(Short Answer)
4.8/5
(32)
ID cards may contain forms of identification in a magnetic strip or in a microchip, as is found in a(n) knowledge card. _________________________
(True/False)
4.9/5
(42)
Identify the letter of the choice that best matches the phrase or definition.
-Process of gathering and analyzing information in the pursuit of business advantage
(Multiple Choice)
4.7/5
(44)
____ fraud is the most common form of ID theft, making up 20 percent of ID theft cases.
(Multiple Choice)
4.9/5
(42)
An access point sends and receives signals to and from computers on the wireless local area ____.
(Multiple Choice)
4.9/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
-Individual who subverts computer security without authorization
(Multiple Choice)
4.9/5
(38)
Showing 121 - 140 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)