Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain how a web bug works.

(Essay)
4.9/5
(53)

_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

(Short Answer)
4.8/5
(32)

_______ is concerned with protecting software and data from unauthorized tampering or damage.

(Multiple Choice)
4.8/5
(36)

Explain cookies and identify the difference between first-party cookies and third-party cookies.

(Essay)
4.9/5
(42)

The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).

(True/False)
5.0/5
(36)

It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.

(True/False)
5.0/5
(33)

Privacy concerns the collection and use of data about individuals.

(True/False)
4.8/5
(39)

Identity theft and mistaken identity are the same.

(True/False)
4.9/5
(41)

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

(True/False)
4.7/5
(31)

A _______ (acronym or 3 words) attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.

(Short Answer)
4.8/5
(33)

Information systems consist of people, procedures, software, hardware, data, and the Internet.

(True/False)
4.9/5
(43)

The essential element that controls how computers are used is a law.

(True/False)
4.7/5
(45)

These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files.

(Multiple Choice)
4.9/5
(31)

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

(Multiple Choice)
4.8/5
(43)

Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.

(Essay)
4.9/5
(37)

Which of the following is not malware?

(Multiple Choice)
4.9/5
(28)

_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

(Short Answer)
4.9/5
(32)

Which of the following is the most widely used wireless network encryption for home wireless networks?

(Multiple Choice)
4.7/5
(41)

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

(Multiple Choice)
4.8/5
(39)

Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

(True/False)
4.8/5
(46)
Showing 41 - 60 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)