Filters
Question type

Study Flashcards

_______ is concerned with protecting software and data from unauthorized tampering or damage.


A) Data backup
B) Physical security
C) Disaster recovery plan
D) Data security

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

_______-party cookies store information about the current session, your general preferences, and your activity on the website.

Correct Answer

verifed

verified

Corporations often use this to prevent copyright violations.


A) Digital Millennium Copyright Act
B) Website encryption
C) Digital rights management (DRM)
D) Keystroke loggers

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Privacy concerns the collection and use of data about individuals.

A) True
B) False

Correct Answer

verifed

verified

A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

Correct Answer

verifed

verified

_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

Correct Answer

verifed

verified

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.


A) Restriction
B) Security
C) Protection
D) Encryption

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The essential element that controls how computers are used is a law.

A) True
B) False

Correct Answer

verifed

verified

According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?


A) Digital Millennium Copyright Act
B) Computer Abuse Amendments Act
C) The Gramm-Leach-Bliley Act
D) Computer Fraud and Abuse Act

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.


A) Spyware
B) Freeware
C) Employee-monitoring software
D) Cookies

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.

Correct Answer

verifed

verified

A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.

A) True
B) False

Correct Answer

verifed

verified

What is plagiarism, and why is it a particular concern today?

Correct Answer

verifed

verified

Plagiarism means representing some other...

View Answer

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

Correct Answer

verifed

verified

Describe spyware and computer monitoring software.

Correct Answer

verifed

verified

The most dangerous type of privacy threa...

View Answer

_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Correct Answer

verifed

verified

_______ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.

Correct Answer

verifed

verified

Most browsers offer a privacy mode which ensures that your browsing activity is not recorded on your hard disk.

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 78 of 78

Related Exams

Show Answer