Exam 9: Network and Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The best protection against many dot cons is ____.

(Multiple Choice)
5.0/5
(28)

In businesses,access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.

(Essay)
4.9/5
(40)

The purpose of a(n)____________________ is to authenticate the identity of an individual or organization.

(Short Answer)
4.9/5
(42)

____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

(Multiple Choice)
4.8/5
(36)

Increasingly,computers and hard drives are ____________________;that is,encrypting all data automatically and invisibly to the user.

(Short Answer)
4.8/5
(37)

____________________ often find their victims online- for instance,someone in a chat room who makes a comment or has a screen name that they do not like.

(Short Answer)
4.9/5
(37)

A computer that is controlled by a hacker or other computer criminal is referred to as a(n)botherder or zombie computer.

(True/False)
4.8/5
(32)

Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.

(Multiple Choice)
4.7/5
(36)

Many Internet security concerns today can be categorized as cybercrimes.

(True/False)
4.8/5
(40)

A(n)____________________ is a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender of a document.

(Short Answer)
5.0/5
(40)

Once installed,____________________ are designed to record every keystroke made on the infected computer and transmit account numbers,passwords,and other related information to criminals.

(Essay)
4.8/5
(31)

Like a computer virus,a computer worm infects other computer files to replicate itself.

(True/False)
4.9/5
(33)

Increasingly,USB security keys,also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network,to supply Web site usernames and passwords,or to provide other security features-are being used.

(Multiple Choice)
4.8/5
(36)

Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.

(True/False)
4.9/5
(38)

____ are sets of tools that allow hackers to access a system.

(Multiple Choice)
4.9/5
(39)

Online fraud,theft,scams,and other related activities are collectively referred to as ____________________.

(Short Answer)
4.8/5
(33)

While two-factor authentication systems are common in the United States,they are not widely used in other countries.

(True/False)
4.8/5
(35)

____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

(Multiple Choice)
4.9/5
(36)

A computer virus that activates when it detects a certain condition,such as when a particular keystroke is pressed,is called a(n)____________________.

(Short Answer)
4.9/5
(32)

____ is a generic term that refers to any type of malicious software.

(Multiple Choice)
4.9/5
(39)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)