Exam 12: Security and Privacy in an Electronic Age

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

____________ theft involves someone using someone's private information to assume his or her identity.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

________________ includes attempts to protect computer systems and the privacy of computerized data.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

A

_______________ is the scrambling of data so that it does NOT make sense.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

Encryption

The _______________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.

(Short Answer)
4.9/5
(28)

____________ may display unwanted pop-up advertisements on your monitor;it may be related to the sites you search on the Web or even the content of your e-mail.

(Multiple Choice)
4.8/5
(39)

The _______________ is composed of 470 insurance companies.Its database contains the health information on 15 million people.

(Short Answer)
4.8/5
(30)

Privacy includes the right to _____________________.

(Multiple Choice)
4.8/5
(29)

The __________________ gives law enforcement agencies greater power to monitor electronic and other communications,with fewer checks.

(Multiple Choice)
4.9/5
(26)

____________________ is the unauthorized copying of software protected by copyright.

(Short Answer)
4.8/5
(46)

_______________ has many aspects.Among them is the ability to control personal information and the right to keep it from misuse.

(Short Answer)
4.8/5
(38)

A ______________ is a program that attaches itself to another program and replicates itself.

(Multiple Choice)
4.7/5
(34)

____________involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator.The user is directed to a fake website and asked to enter information.

(Short Answer)
4.8/5
(36)

The unauthorized copying of software protected by copyright is a crime called _______________.

(Multiple Choice)
4.8/5
(41)

A _______________ is a program that attaches itself to another program and replicates itself.It may do damage to your hardware or destroy your data.

(Short Answer)
4.8/5
(34)

The first federal legislation protecting the privacy of medical records is _______________.

(Short Answer)
4.8/5
(30)

The _______________ Act gives lawenforcement agencies greater power to monitor electronic and other communications,with fewer checks.

(Short Answer)
4.8/5
(29)

A ___________ can connect the user with numbers without the user's knowledge;the dialer may connect the user's computer to an expensive 900 number.

(Short Answer)
4.8/5
(34)

_______________ of restricting access to computer systems includes fingerprints,handprints,retina or iris scans,lip prints,and facial thermography.

(Short Answer)
4.8/5
(38)

The _______________ has been interpreted to allow employers access to employees' e-mail.

(Short Answer)
4.8/5
(37)

Electronic blocks (called __________________)can be used to limit access to networks.

(Short Answer)
4.7/5
(40)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)