Exam 7: Computer and Network Security
Exam 1: Catalysts for Change64 Questions
Exam 2: Introduction to Ethics44 Questions
Exam 3: Networked Communications32 Questions
Exam 4: Intellectual Property40 Questions
Exam 5: Information Privacy21 Questions
Exam 6: Privacy and the Government33 Questions
Exam 7: Computer and Network Security20 Questions
Exam 8: Computer Reliability27 Questions
Exam 9: Professional Ethics22 Questions
Exam 10: Work and Wealth26 Questions
Select questions type
Determining that a person is who he or she claims to be on a computer is called
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
B
A is a piece of self-replicating code embedded within another program called the host.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
virus
A program with a benign capability that conceals another, sinister purpose is called a
(Multiple Choice)
4.8/5
(35)
According to some estimates, 90 percent of spam is distributed through networks.
(Short Answer)
4.7/5
(31)
A self-contained program that spreads through a computer network by exploiting security holes is called a
(Multiple Choice)
4.8/5
(39)
Vote-counting irregularities in the State of in the 2000 U.S. Presidential election led to more interest in computerized voting systems.
(Short Answer)
4.9/5
(32)
A is a computer, positioned between a local network and the Internet, that monitors the packets flowing in and out.
(Short Answer)
4.9/5
(33)
The process of determining that a user has permission to perform a particular action on a computer is called
(Multiple Choice)
4.8/5
(35)
A piece of self-replicating code embedded within another program is called a
(Multiple Choice)
4.9/5
(25)
An intentional action designed to prevent legitimate users from making use of a computer service is called a .
(Short Answer)
4.8/5
(30)
A is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.
(Short Answer)
4.8/5
(29)
A software program that responds to commands sent by a command-and-control program located on an external computer is called a
(Multiple Choice)
4.8/5
(28)
The manipulation of a person inside an organization to gain access to confidential information is called .
(Short Answer)
4.7/5
(36)
Manipulating someone within an organization to gain access to confidential information is called
(Multiple Choice)
4.8/5
(42)
An intentional action designed to prevent legitimate users from making use of a computer service is called
(Multiple Choice)
4.7/5
(35)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)