Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

It is important to select strong passwords and change them frequently.

(True/False)
4.8/5
(41)

Discuss online auction fraud.

(Essay)
4.8/5
(32)

Biometric authentication uses information that an individual should know or can easily remember.

(True/False)
4.8/5
(31)

A(n)____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.

(Short Answer)
4.7/5
(38)

Information used in identity theft can be obtained by skimming or via social engineering.

(True/False)
4.8/5
(30)

When a digitally signed document is received,the recipient's computer uses the sender's ____ key to verify the digital signature.

(Multiple Choice)
5.0/5
(39)

Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal,but it is considered highly unethical and irresponsible behavior.

(True/False)
4.8/5
(29)

A(n)denial of service (DoS)attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer.

(True/False)
4.8/5
(41)

Case 9-2 Fernando has been having problems with his computer.He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. -The technician tells Fernando that his computer has a ____,which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.

(Multiple Choice)
4.9/5
(41)

Computer crime is sometimes referred to as ____.

(Multiple Choice)
4.8/5
(32)

Wi-Fi security features work by default.

(True/False)
4.9/5
(40)

To protect yourself against ____________________ and other types of online harassment,use gender-neutral,nonprovocative identifying names.

(Short Answer)
4.8/5
(36)

____ can be extremely distressing for victims,can take years to straighten out,and can be very expensive.

(Multiple Choice)
4.8/5
(34)

____,the most commonly used type of possessed knowledge,are secret words or character combinations associated with an individual.

(Multiple Choice)
4.9/5
(38)

Private key encryption is also called symmetric key encryption.

(True/False)
4.8/5
(35)

The ____,implemented in 2001,grants federal authorities expanded surveillance and intelligence-gathering powers,such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

(Multiple Choice)
4.8/5
(46)

Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.

(True/False)
4.8/5
(28)

Like a computer virus,a ____ is a malicious program designed to cause damage.

(Multiple Choice)
4.8/5
(43)

How do firewalls work?

(Essay)
4.7/5
(34)

  -____ software,such as that shown in the accompanying figure,can control which devices can be connected to an employee's computer. -____ software,such as that shown in the accompanying figure,can control which devices can be connected to an employee's computer.

(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)