Exam 10: Computer Security and Risks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________-control software monitors and records computer transactions as they happen,so they can be traced and identify suspicious computer activity after the fact.

(Short Answer)
4.8/5
(28)

A virus that is programmed to destroy PC files on a specific date is known as what kind of virus?

(Multiple Choice)
4.7/5
(29)

An encryption ________ is the secret numerical code a user will utilize to encrypt a message.

(Short Answer)
4.7/5
(39)

What is the name of an application program that gathers user information and sends it to someone through the Internet?

(Multiple Choice)
4.8/5
(31)

The typical computer criminal is a(n)

(Multiple Choice)
4.8/5
(35)

An account that has additional access privileges is known as a system ________ account.

(Short Answer)
4.8/5
(38)

Placing a phone call pretending to be someone else,in order to trick someone into doing something is also known as

(Multiple Choice)
4.9/5
(40)

Match the Act on the left to the appropriate explanation on the right. -Communications Decency Act

(Multiple Choice)
4.9/5
(38)

The NSA has invested heavily in ________,a program to secure electronic communication from eavesdroppers while enabling the U.S.government to intercept CE signals.

(Short Answer)
4.9/5
(35)

In 2000 the U.S.government found Microsoft guilty of operating a monopoly.

(True/False)
4.9/5
(32)

Match the Act on the left to the appropriate explanation on the right. -USA Patriot Act

(Multiple Choice)
4.8/5
(40)

The name for harassment on the Internet is

(Multiple Choice)
4.9/5
(44)

Security procedures eliminate all risks to computers.

(True/False)
4.8/5
(35)

According to the FBI,how much identity theft begins with email?

(Multiple Choice)
4.9/5
(41)

Match the Act on the left to the appropriate explanation on the right. -Computer Fraud and Abuse Act

(Multiple Choice)
4.8/5
(42)

A programmed attack that destroys data files if a programmer is ever terminated is an example of what kind of Trojan horse?

(Multiple Choice)
4.8/5
(32)

What is a complex system that takes on nearly complete responsibility for a task eliminating the need for human input,verification,or decision making?

(Multiple Choice)
4.8/5
(41)

Creating strong computer security to prevent computer crime usually simultaneously helps protect privacy rights.

(True/False)
4.9/5
(37)

A(n)________ can shield electronic equipment from power spikes.

(Multiple Choice)
5.0/5
(29)

Theft of computers is most common for desktop computers.

(True/False)
4.7/5
(38)
Showing 41 - 60 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)