Exam 8: Protecting People and Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How do business monitor email?

Free
(Multiple Choice)
5.0/5
(24)
Correct Answer:
Verified

D

What is the most prevalent type of computer virus?

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

D

Copyright is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

Identity theft occurs when someone forges your identity for fraudulent purposes.

(True/False)
4.9/5
(33)

What type of hardware and/or software should you install to protect your computer from intruders entering into your system from your network connection?

(Multiple Choice)
4.9/5
(34)

Intellectual property is tangible creative work that is embodied in physical form.

(True/False)
4.9/5
(22)

What is identity theft?

(Multiple Choice)
4.7/5
(31)

Which of the following examines information passing through network switches,hubs,or routers?

(Multiple Choice)
4.7/5
(30)

Copyright applies to the implementation of an idea.

(True/False)
4.9/5
(36)

Which of the following can not be used for biometrics?

(Multiple Choice)
4.7/5
(34)

Ethics are the principles and standards that guide our behavior toward other people.

(True/False)
4.9/5
(34)

_____ occurs when someone forges your identity for fraudulent purposes.

(Short Answer)
4.7/5
(22)

If you were trying to access your campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus,what type of attack would you be experiencing?

(Multiple Choice)
4.8/5
(33)

Which of the following is a small file that contains information about you and your Web activities?

(Multiple Choice)
4.8/5
(32)

Denial-of-service means not being able to log on because of an invalid password.

(True/False)
4.7/5
(33)

What says that you may use copyrighted material in certain situations - for example,in the creation of new work or,within certain limits,for teaching purposes?

(Multiple Choice)
4.8/5
(28)

What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?

(Multiple Choice)
4.8/5
(30)

A(n)_____ examines information passing through switches,hubs,or routers.

(Short Answer)
4.9/5
(34)

Which of the following is the unauthorized use,duplication,distribution,or sale of copyrighted software?

(Multiple Choice)
4.8/5
(29)

Security-auditing software presents a false target for hackers,then logs their key strokes.

(True/False)
4.9/5
(36)
Showing 1 - 20 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)