Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____-party cookies store information about the current session, your general preferences, and your activity on one Web site.

(Short Answer)
4.8/5
(49)

How do firewalls work?

(Essay)
4.9/5
(40)

_____, a privacy issue, relates to the responsibility of controlling who is able to use data.

(Short Answer)
4.9/5
(39)

Which of the following is not malware?

(Multiple Choice)
4.7/5
(35)

Identity theft and mistaken identity are the same.

(True/False)
4.9/5
(48)

Corporations often use this to prevent copyright violations.

(Multiple Choice)
4.9/5
(45)

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _____.

(Short Answer)
4.8/5
(47)

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

(Multiple Choice)
4.8/5
(41)

This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

(Multiple Choice)
4.8/5
(44)

These are used by advertisers to keep track of your Web activity as you move from one site to the next.

(Multiple Choice)
4.8/5
(29)

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.

(Multiple Choice)
4.7/5
(40)

It is highly likely that each one of us has an electronic profile created by information resellers.

(True/False)
4.8/5
(38)

Spy removal programs are designed to detect and remove various types of privacy threats.

(True/False)
4.8/5
(41)

Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

(True/False)
5.0/5
(37)

_____ attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate.

(Short Answer)
4.8/5
(45)

These crimes include the theft of data in the form of confidential information.

(Multiple Choice)
4.8/5
(34)

Explain cookies and identify the difference between first-party cookies and third-party cookies.

(Essay)
4.8/5
(33)

People that collect and sell personal data are called:

(Multiple Choice)
4.8/5
(32)
Showing 61 - 78 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)