Exam 8: Protecting People and Information: Threats and Safeguards
A(n)_____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
hardware key logger
Explanation: A hardware key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.These devices can be in the form of a connector on the system-unit end of the cable between the keyboard and the system unit.
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.
CAN-Spam Act,2003
Explanation: The CAN-Spam Act,2003,sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.The law forbids deceptive subject lines,headers,return addresses,etc. ,as well as harvesting e-mail addresses from Web sites.It requires businesses that send spam to maintain a do-not-spam list and to include a postal mailing address in the message.
_____ break into other people's computer systems and may just look around,or they may steal credit card numbers or destroy information,or otherwise do damage.
Black-hat hackers
Explanation: Black-hat hackers break into other people's computer systems and may just look around,or they may steal credit card numbers or destroy information,or otherwise do damage.
Log analysis is a monitoring tool that keeps track of logons,deletions,and so forth.
Hackers who have a philosophical or political message that they want to share are called hacktivists.
Which of the following is a program that,when installed on a computer,records every mouse click?
_____ refers to programs that Web sites offer to help people monitor what is happening on a computer.
Benign viruses are the worst kinds of viruses as they have the capacity to damage computers.
Intellectual property refers to tangible creative work that is embodied in non-physical form.
_____ is the unauthorized use,duplication,distribution,or sale of copyrighted software.
A(n)______ is hardware and/or software that protects a computer or a network from intruders.
A(n)_____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
The CAN-Spam Act is an anti-spam law passed by the Federal Government which bans spamming entirely.
Katherine Wood,a critically acclaimed feminist poet,recently published her second anthology of poetry.Which of the following will protect her work from being used by other people without her permission?
Key logging refers to the rerouting of a person's request for a legitimate Web site to a fake site which then collects information from the person.
Spyware is a kind of software that blocks malicious software from entering one's computer.
_____ are knowledgeable computer users who use their knowledge to invade other people's computers and have varying motives behind their actions.
_____ scrambles the contents of a file so that you cannot read it without having the right decryption key.
Without spyware,a Web site cannot tell a lot about its Web visitors.
_____ is software to generate advertisements that installs itself on a person's computer when they download some other program from the Web.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)