Exam 9: Network and Internet Security
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: The System Unit: Processing and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software100 Questions
Exam 7: Computer Networks100 Questions
Exam 8: The Internet and the World Wide Web100 Questions
Exam 9: Network and Internet Security100 Questions
Exam 10: Multimedia and the Web100 Questions
Exam 11: E-Commerce100 Questions
Exam 12: Information Systems and System Development100 Questions
Exam 13: Program Development and Programming Languages100 Questions
Exam 14: Databases and Database Management Systems100 Questions
Exam 15: Computer Security and Privacy100 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Access, and the Environment100 Questions
Select questions type
In businesses,access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
(Essay)
4.9/5
(40)
The purpose of a(n)____________________ is to authenticate the identity of an individual or organization.
(Short Answer)
4.9/5
(42)
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
(Multiple Choice)
4.8/5
(36)
Increasingly,computers and hard drives are ____________________;that is,encrypting all data automatically and invisibly to the user.
(Short Answer)
4.8/5
(37)
____________________ often find their victims online- for instance,someone in a chat room who makes a comment or has a screen name that they do not like.
(Short Answer)
4.9/5
(37)
A computer that is controlled by a hacker or other computer criminal is referred to as a(n)botherder or zombie computer.
(True/False)
4.8/5
(32)
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.
(Multiple Choice)
4.7/5
(36)
Many Internet security concerns today can be categorized as cybercrimes.
(True/False)
4.8/5
(40)
A(n)____________________ is a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender of a document.
(Short Answer)
5.0/5
(40)
Once installed,____________________ are designed to record every keystroke made on the infected computer and transmit account numbers,passwords,and other related information to criminals.
(Essay)
4.8/5
(31)
Like a computer virus,a computer worm infects other computer files to replicate itself.
(True/False)
4.9/5
(33)
Increasingly,USB security keys,also called USB security ____-USB flash drives that are inserted into a computer to grant access to a network,to supply Web site usernames and passwords,or to provide other security features-are being used.
(Multiple Choice)
4.8/5
(36)
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.
(True/False)
4.9/5
(38)
____ are sets of tools that allow hackers to access a system.
(Multiple Choice)
4.9/5
(39)
Online fraud,theft,scams,and other related activities are collectively referred to as ____________________.
(Short Answer)
4.8/5
(33)
While two-factor authentication systems are common in the United States,they are not widely used in other countries.
(True/False)
4.8/5
(35)
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
(Multiple Choice)
4.9/5
(36)
A computer virus that activates when it detects a certain condition,such as when a particular keystroke is pressed,is called a(n)____________________.
(Short Answer)
4.9/5
(32)
____ is a generic term that refers to any type of malicious software.
(Multiple Choice)
4.9/5
(39)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)