Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discuss the proper disposal of hardware containing sensitive information.

Free
(Essay)
4.9/5
(34)
Correct Answer:
Verified

CDs,DVDs,and other media containing sensitive data should be shredded,and the hard drives of computers to be disposed of should be wiped-overwritten several times using special disk-wiping or disk-erasing software-before they are sold or recycled.Unlike the data on a drive that has merely been erased or even reformatted (which can still be recovered),data on a properly wiped drive is very difficult or impossible to recover.Wiping is typically viewed as an acceptable precaution for deleting sensitive data (such as Web site passwords and tax returns)from hard drives and other storage media belonging to individuals,as well as for storage media to be reused within an organization.However,before disposing of storage media containing sensitive data,businesses should consider physically destroying the media,such as by shredding or melting the hardware.To help with this process,data destruction services can be used.To ensure that all hardware containing business data is properly disposed of,it is important for all businesses today to develop and implement a policy (often called a media sanitization or data destruction policy)for destroying data that is no longer needed.

Chain locks can be used to secure computers and other hardware.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

False

____ devices are designed to withstand much more physical abuse than conventional devices.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

The video card is worn by an employee for continuous access and monitoring purposes.

(True/False)
4.8/5
(28)

Read the Web site's piracy rules (if they exist)before providing any personal information.

(True/False)
4.9/5
(36)

  -ID cards with ____________________ or RFID capabilities,as shown in the accompanying figure,can be used for facility access,computer access,and employee monitoring. -ID cards with ____________________ or RFID capabilities,as shown in the accompanying figure,can be used for facility access,computer access,and employee monitoring.

(Short Answer)
4.9/5
(35)

While on the go,the best antitheft measure is ____________________.

(Short Answer)
4.9/5
(40)

Mobile protection software can remotely lock down a lost or stolen phone,display a message on the phone containing instructions for returning the device,and/or play a sound to help the owner locate the phone if it is nearby.

(True/False)
4.8/5
(32)

____________________,the unauthorized copying of a computer program,is illegal in the United States and many other-but not all-countries.

(Short Answer)
5.0/5
(33)

Often used in conjunction with face recognition technology,public video surveillance systems are used to try to identify known terrorists and other criminals,to identify criminals whose crimes are caught on tape,and to prevent crimes from occurring.

(True/False)
4.8/5
(39)

To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

(Multiple Choice)
5.0/5
(31)

____ are used for marketing purposes,such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.

(Multiple Choice)
5.0/5
(42)

It is illegal to use computer monitoring software on your own computer or on the computers of your employees.

(True/False)
4.9/5
(43)

Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information. -In order to lessen the chances of his main e-mail address getting spam,he uses a ____ e-mail address when shopping online.

(Multiple Choice)
4.8/5
(41)

One of the most obvious types of hardware loss is hardware theft.

(True/False)
4.9/5
(36)

For monitoring the physical locations of employees,video cameras can be used,but another possibility is the use of ____.

(Multiple Choice)
4.9/5
(42)

____ cameras are also increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

(Multiple Choice)
4.8/5
(30)

____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

(Multiple Choice)
5.0/5
(33)

The high level of concern regarding computer security and personal privacy has led state and federal legislators to pass a variety of laws since the ____.

(Multiple Choice)
4.8/5
(32)

Computer tracking software sends identifying information to the computer tracking company on a regular basis.

(True/False)
4.9/5
(39)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)