Exam 10: Computer Security and Risks
Exam 1: Exploring Our Digital Planet133 Questions
Exam 2: Hardware Basics: Inside the Box146 Questions
Exam 3: Hardware Basics: Peripherals133 Questions
Exam 4: Software Basics: the Ghost in the Machine127 Questions
Exam 5: Productivity Applications118 Questions
Exam 6: Graphics, digital Media, and Multimedia110 Questions
Exam 7: Database Applications and Privacy Implications126 Questions
Exam 8: Networking and Digital Communication134 Questions
Exam 9: The Evolving Internet115 Questions
Exam 10: Computer Security and Risks84 Questions
Exam 11: Computers at Work, school, and Home96 Questions
Exam 12: Information Systems in Business129 Questions
Exam 13: E-Commerce and E-Business: the Evolving Internet Economy68 Questions
Exam 14: Systems Design and Development145 Questions
Exam 15: Is Artificial Intelligence Real80 Questions
Exam 16: Computer and Internet Terminology81 Questions
Select questions type
________-control software monitors and records computer transactions as they happen,so they can be traced and identify suspicious computer activity after the fact.
(Short Answer)
4.8/5
(28)
A virus that is programmed to destroy PC files on a specific date is known as what kind of virus?
(Multiple Choice)
4.7/5
(29)
An encryption ________ is the secret numerical code a user will utilize to encrypt a message.
(Short Answer)
4.7/5
(39)
What is the name of an application program that gathers user information and sends it to someone through the Internet?
(Multiple Choice)
4.8/5
(31)
An account that has additional access privileges is known as a system ________ account.
(Short Answer)
4.8/5
(38)
Placing a phone call pretending to be someone else,in order to trick someone into doing something is also known as
(Multiple Choice)
4.9/5
(40)
Match the Act on the left to the appropriate explanation on the right.
-Communications Decency Act
(Multiple Choice)
4.9/5
(38)
The NSA has invested heavily in ________,a program to secure electronic communication from eavesdroppers while enabling the U.S.government to intercept CE signals.
(Short Answer)
4.9/5
(35)
In 2000 the U.S.government found Microsoft guilty of operating a monopoly.
(True/False)
4.9/5
(32)
Match the Act on the left to the appropriate explanation on the right.
-USA Patriot Act
(Multiple Choice)
4.8/5
(40)
According to the FBI,how much identity theft begins with email?
(Multiple Choice)
4.9/5
(41)
Match the Act on the left to the appropriate explanation on the right.
-Computer Fraud and Abuse Act
(Multiple Choice)
4.8/5
(42)
A programmed attack that destroys data files if a programmer is ever terminated is an example of what kind of Trojan horse?
(Multiple Choice)
4.8/5
(32)
What is a complex system that takes on nearly complete responsibility for a task eliminating the need for human input,verification,or decision making?
(Multiple Choice)
4.8/5
(41)
Creating strong computer security to prevent computer crime usually simultaneously helps protect privacy rights.
(True/False)
4.9/5
(37)
A(n)________ can shield electronic equipment from power spikes.
(Multiple Choice)
5.0/5
(29)
Showing 41 - 60 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)