Exam 43: Machine-Level Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Mac computer employs the ____ system to encrypt its file data.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

A common form of authentication is a ____.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

An item such as a smart card is an example of the ____ form of authentication.

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B

Internet-based backup services in the cloud are a popular way to back up files for many users.

(True/False)
5.0/5
(39)

A popular encryption method used to protect data that travels over a wireless network is ____.

(Multiple Choice)
4.8/5
(32)

The only time it is considered safe to send private information over a public wireless network is if it has ____.

(Multiple Choice)
4.8/5
(41)

Many businesses protect valuable information on a computer by limiting who uses it.

(True/False)
4.8/5
(46)

An individual who illegally downloads copyright-protected software is referred to as a ____.

(Multiple Choice)
4.9/5
(34)

An Internet-based crime is referred to as a(n)____ crime.

(Multiple Choice)
4.9/5
(31)

Microsoft Windows uses ____ Drive Encryption.

(Multiple Choice)
4.9/5
(38)

A ____ is commonly packaged with a new computer system.

(Multiple Choice)
4.8/5
(36)

Information security is a growing concern due to the amount of important and sometimes private information stored digitally.

(True/False)
4.9/5
(43)

Files can only be encrypted as they are opened.

(True/False)
4.8/5
(29)

Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.

(Multiple Choice)
4.8/5
(37)

Biometrics uses a token system to authenticate users of a device.

(True/False)
4.9/5
(34)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)