Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ databases contain marketing and demographic data about people,such as where they live and what products they buy.

(Short Answer)
4.9/5
(33)

In response to the increased occurrence of identity theft,some local governments have removed birth and death information from their available online records.

(True/False)
4.9/5
(27)

The disaster recovery plan is also called a business continuity plan.

(True/False)
5.0/5
(37)

A growing illegal use of computer monitoring software is for a hacker to use a(n)____________________ system to capture usernames,passwords,and other sensitive data entered into the computer via the keyboard.

(Short Answer)
4.8/5
(36)

At the present time,opting-out procedures are confusing and time-consuming,and they do not always work well.

(True/False)
4.8/5
(29)

To provide continuous power to facilities (such as hospitals,nuclear power plants,and business data centers)that cannot afford to be without power for any period of time,generators can be used.

(True/False)
4.8/5
(25)

There are many options for protecting yourself against computer monitoring by your employer or the government.

(True/False)
4.8/5
(33)

Our networked society has raised a number of ____ concerns.

(Multiple Choice)
4.8/5
(26)

Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

(Multiple Choice)
4.9/5
(32)

____ refers to companies recording or observing the actions of employees while on the job.

(Multiple Choice)
4.8/5
(34)

Case 15-1 IBF Consultants,LLC provides consulting services in privacy and theft deterrence solutions. -Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft.IBF advises her to attach ____ to these devices.

(Multiple Choice)
4.8/5
(30)

Computer monitoring programs can keep a log of all computer keystrokes performed on a computer,record the activities taking place,take screen shots of the screen at specified intervals,and more.

(True/False)
4.8/5
(28)

Why should you be concerned about computer security?

(Essay)
4.8/5
(33)

____ refers to the ability of one computing device on a network (such as the Internet)to locate and identify another device on the same network and determine its status.

(Multiple Choice)
4.9/5
(30)

Some software tools are not designed to prevent hardware from being stolen;instead,they are designed to aid in its ____.

(Multiple Choice)
4.9/5
(41)

Information such as birth records,marriage certificates,and divorce information,as well as property purchases,assessments,liens,and tax values is confidential and can legally be seen only by authorized individuals.

(True/False)
4.9/5
(41)

____ devices typically have a durable case and are spill-resistant,but may not withstand falls from three feet or more onto concrete.

(Multiple Choice)
4.8/5
(45)

To protect against ____________________,set your IM program to accept messages only from people on your buddy list.

(Short Answer)
4.8/5
(31)

Often any sign that computer tracking software is running on the computer or is sending information via the Internet is hidden from the user;this type of software is sometimes called ____________________ software.

(Short Answer)
4.8/5
(42)

Some states permit searches for property located in that state,such as displaying the owner's name,address,and a link to additional information including property value for the supplied owner name.

(True/False)
4.9/5
(45)
Showing 41 - 60 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)