Exam 15: Computer Security and Privacy
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: The System Unit: Processing and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software100 Questions
Exam 7: Computer Networks100 Questions
Exam 8: The Internet and the World Wide Web100 Questions
Exam 9: Network and Internet Security100 Questions
Exam 10: Multimedia and the Web100 Questions
Exam 11: E-Commerce100 Questions
Exam 12: Information Systems and System Development100 Questions
Exam 13: Program Development and Programming Languages100 Questions
Exam 14: Databases and Database Management Systems100 Questions
Exam 15: Computer Security and Privacy100 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Access, and the Environment100 Questions
Select questions type
____________________ databases contain marketing and demographic data about people,such as where they live and what products they buy.
(Short Answer)
4.9/5
(33)
In response to the increased occurrence of identity theft,some local governments have removed birth and death information from their available online records.
(True/False)
4.9/5
(27)
The disaster recovery plan is also called a business continuity plan.
(True/False)
5.0/5
(37)
A growing illegal use of computer monitoring software is for a hacker to use a(n)____________________ system to capture usernames,passwords,and other sensitive data entered into the computer via the keyboard.
(Short Answer)
4.8/5
(36)
At the present time,opting-out procedures are confusing and time-consuming,and they do not always work well.
(True/False)
4.8/5
(29)
To provide continuous power to facilities (such as hospitals,nuclear power plants,and business data centers)that cannot afford to be without power for any period of time,generators can be used.
(True/False)
4.8/5
(25)
There are many options for protecting yourself against computer monitoring by your employer or the government.
(True/False)
4.8/5
(33)
Our networked society has raised a number of ____ concerns.
(Multiple Choice)
4.8/5
(26)
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
(Multiple Choice)
4.9/5
(32)
____ refers to companies recording or observing the actions of employees while on the job.
(Multiple Choice)
4.8/5
(34)
Case 15-1
IBF Consultants,LLC provides consulting services in privacy and theft deterrence solutions.
-Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft.IBF advises her to attach ____ to these devices.
(Multiple Choice)
4.8/5
(30)
Computer monitoring programs can keep a log of all computer keystrokes performed on a computer,record the activities taking place,take screen shots of the screen at specified intervals,and more.
(True/False)
4.8/5
(28)
____ refers to the ability of one computing device on a network (such as the Internet)to locate and identify another device on the same network and determine its status.
(Multiple Choice)
4.9/5
(30)
Some software tools are not designed to prevent hardware from being stolen;instead,they are designed to aid in its ____.
(Multiple Choice)
4.9/5
(41)
Information such as birth records,marriage certificates,and divorce information,as well as property purchases,assessments,liens,and tax values is confidential and can legally be seen only by authorized individuals.
(True/False)
4.9/5
(41)
____ devices typically have a durable case and are spill-resistant,but may not withstand falls from three feet or more onto concrete.
(Multiple Choice)
4.8/5
(45)
To protect against ____________________,set your IM program to accept messages only from people on your buddy list.
(Short Answer)
4.8/5
(31)
Often any sign that computer tracking software is running on the computer or is sending information via the Internet is hidden from the user;this type of software is sometimes called ____________________ software.
(Short Answer)
4.8/5
(42)
Some states permit searches for property located in that state,such as displaying the owner's name,address,and a link to additional information including property value for the supplied owner name.
(True/False)
4.9/5
(45)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)