Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

It is not a good idea to turn off your computer before moving it.

(True/False)
4.7/5
(38)

Laptop ____________________ software emits a very loud noise if the computer is unplugged,if USB devices are removed,or if the computer is shut down without the owner's permission.

(Short Answer)
4.8/5
(31)

Some electronic tools,such as computer monitoring software and video surveillance equipment,can be used legally by individuals,businesses,and law enforcement agencies.

(True/False)
4.7/5
(31)

A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.

(True/False)
4.8/5
(22)

____ can be used to secure portable computers,external hard drives,and other portable pieces of hardware to a table or other object.

(Multiple Choice)
4.9/5
(30)

System failure can occur because of a hardware problem,software problem,or a computer virus.

(True/False)
4.8/5
(39)

To protect hardware from damage due to power fluctuations,it is important for all users to use a surge ____________________ with a computer whenever it is plugged into a power outlet.

(Short Answer)
4.8/5
(38)

To comply with truth-in-advertising laws,a(n)unsubscribe e-mail address included in an unsolicited e-mail must be a working address.

(True/False)
4.9/5
(35)

A(n)____ is an alternate location equipped with the computers,cabling,desks,and other equipment necessary to keep a business's operations going.

(Multiple Choice)
4.8/5
(25)

One common way to deal with spam that makes it to your computer is to use a(n)____.

(Multiple Choice)
5.0/5
(27)

  -The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN. -The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

(Multiple Choice)
4.9/5
(31)

Case 15-1 IBF Consultants,LLC provides consulting services in privacy and theft deterrence solutions. -One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised.Which of the following technologies would be useful in this case?

(Multiple Choice)
4.9/5
(45)

____________________ labels change their appearance if someone (such as a thief)tries to remove them.

(Short Answer)
4.8/5
(48)

Collecting in-depth information about an individual is known as ____.

(Multiple Choice)
5.0/5
(37)

Information about individuals is not available in government databases.

(True/False)
4.8/5
(34)

A marketing activity that can be considered a privacy risk is ____.

(Multiple Choice)
4.9/5
(39)

The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled.

(True/False)
4.8/5
(26)

____________________ fluctuations,heat,dust,and static can all damage computer hardware.

(Short Answer)
4.9/5
(30)

A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.

(True/False)
4.7/5
(32)

Hardware loss,as well as other security issues,can result from hardware damage (both intentional and accidental)and ____.

(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)