Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers in a Changing Society
Exam 4: Network and Internet Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Essay
Discuss online auction fraud.
Question 22
Multiple Choice
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business) .
Question 23
True/False
Private key encryption is also called symmetric key encryption.
Question 24
Multiple Choice
Some Web-based encrypted e-mail systems-such as the popular free ____ service-require both the sender and recipient to have accounts through that system.
Question 25
Multiple Choice
Like a computer virus, a ____ is a malicious program designed to cause damage.
Question 26
Multiple Choice
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
Question 27
Short Answer
Typically, ____________________ begins with obtaining a person's name and Social Security number, often from a credit application, rental application, or similar form.
Question 28
True/False
Computer spyware includes any illegal act involving a computer. _________________________
Question 29
Short Answer
To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.
Question 30
Multiple Choice
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.
Question 31
Multiple Choice
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
Question 32
True/False
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
Question 33
Multiple Choice
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
Question 34
Multiple Choice
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.
Question 35
Short Answer
Digital certificates are obtained from a(n)____________________ and typically contain the name of the person, organization, or Web site being certified along with a certificate serial number, an expiration date, and a public/private key pair.