Exam 11: Computer Crime and Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

____ software uses several techniques to find viruses on a computer system, remove them if possible, and keep additional viruses from infecting the system.

(Multiple Choice)
4.9/5
(31)

On the Internet everyone is just a number-an ____ protocol address such as 128.186.88.100.

(Multiple Choice)
4.9/5
(43)

A ____ is a logical address used by clients and servers that is associated with a specific service.

(Multiple Choice)
4.8/5
(31)

For random attacks, an attacker may employ port-scanning software to search random ____ for open ports.

(Multiple Choice)
4.9/5
(41)

What is computer housecleaning? Name four things that you could do to houseclean your computer.

(Essay)
4.9/5
(42)

With remote data backups, changes to your hard drive are ____ and transmitted via your Internet connection to remote data centers.

(Multiple Choice)
4.9/5
(45)

Identify the letter of the choice that best matches the phrase or definition. -Hacker who breaks the law

(Multiple Choice)
4.9/5
(33)

Windows PC users who find their system damaged but are still able to start the computer can benefit from the System ____ utility.

(Multiple Choice)
4.9/5
(36)

A ____ is someone of questionable ethics.

(Multiple Choice)
4.8/5
(30)

Information security is concerned with three main areas including ____________________, which states that information should be available only to those who rightfully have access to it.

(Short Answer)
4.8/5
(34)

The ____________________ is typically the only user who has full access to the system.

(Short Answer)
4.9/5
(32)

Protection of ____ property can take many forms, including copyrights, trademarks, trade secrets, and patents.

(Multiple Choice)
4.7/5
(39)

About ____ percent of data loss is attributed to software corruption.

(Multiple Choice)
4.7/5
(36)

Gramm-Leach-Bliley Act (GLBA) of ____ requires banks and financial institutions to alert customers to their policies and practices in disclosing customer information.

(Multiple Choice)
4.9/5
(36)

____________________ is the criminal act of using stolen information about a person to assume that person's identity, typically for financial gain.

(Short Answer)
4.8/5
(32)

ID cards may contain forms of identification in a magnetic strip or in a microchip, as is found in a(n) knowledge card. _________________________

(True/False)
4.9/5
(42)

Identify the letter of the choice that best matches the phrase or definition. -Process of gathering and analyzing information in the pursuit of business advantage

(Multiple Choice)
4.7/5
(44)

____ fraud is the most common form of ID theft, making up 20 percent of ID theft cases.

(Multiple Choice)
4.9/5
(42)

An access point sends and receives signals to and from computers on the wireless local area ____.

(Multiple Choice)
4.9/5
(33)

Identify the letter of the choice that best matches the phrase or definition. -Individual who subverts computer security without authorization

(Multiple Choice)
4.9/5
(38)
Showing 121 - 140 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)