Filters
Question type

Study Flashcards

A(n) _____ acts as a security buffer between a corporation's private network and all external networks.


A) firewall
B) password
C) disaster recovery plan
D) virus checker

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.

A) True
B) False

Correct Answer

verifed

verified

A program that replicates itself and clogs computers and networks.


A) Virus
B) Worm
C) Denial-of-service attack
D) Trojan horse

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.

Correct Answer

verifed

verified

Computer criminals that create and spread viruses are punished under this law.


A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is the most widely used wireless network encryption for home wireless networks?


A) WEP
B) WPE
C) WPA
D) WPA2

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.

A) True
B) False

Correct Answer

verifed

verified

Describe how information about individuals is collected and compiled.

Correct Answer

verifed

verified

Large organizations are constantly compi...

View Answer

Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.

A) True
B) False

Correct Answer

verifed

verified

Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.

Correct Answer

verifed

verified

Copyright is a legal concept that gives ...

View Answer

_____ is concerned with protecting software and data from unauthorized tampering or damage.


A) Data backup
B) Physical security
C) Disaster recovery plan
D) Data security

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

_____ bugs are invisible images or HTML code hidden within a Web page or e-mail message and are used to transmit information without your knowledge.

Correct Answer

verifed

verified

If copyright-protected music is uploaded to a Web site, it is legal to download it.

A) True
B) False

Correct Answer

verifed

verified

According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?


A) Digital Millennium Copyright Act
B) Computer Abuse Amendments Act
C) The Gramm-Leach-Bliley Act
D) Computer Fraud and Abuse Act

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Free computer games and free screen saver programs are typical carriers of:


A) DoS
B) worms
C) viruses
D) Trojan horses

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Biometric scanning devices are used to scan employee identification cards.

A) True
B) False

Correct Answer

verifed

verified

Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _____.

Correct Answer

verifed

verified

It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.

A) True
B) False

Correct Answer

verifed

verified

Describe the three most common types of malware, including viruses, worms, and Trojan horses.

Correct Answer

verifed

verified

Viruses are programs that migrate throug...

View Answer

Describe spyware and computer monitoring software.

Correct Answer

verifed

verified

The most dangerous type of privacy threa...

View Answer

Showing 41 - 60 of 78

Related Exams

Show Answer