A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user’s account. Select one: |
False |
Which of the following is the most widely used wireless network encryption for home wireless networks? Select one: |
WPA2 |
People that collect and sell personal data are called _______. Select one: |
Information resellers |
_______ is concerned with protecting software and data from unauthorized tampering or damage. Select one: |
Data security |
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. Select one: |
Privacy mode |
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person. Select one: |
Cyberbullying |
If copyright-protected music is uploaded to a website, it is legal to download it. Select one: |
False |
According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away? Select one: |
Digital Millennium Copyright Act |
This is a legal concept that gives content creators the right to control use and distribution of their work. Select one: |
Copyright |
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. Select one: |
Rogue |
Most browsers offer a privacy mode which ensures that your browsing activity is not recorded on your hard disk. Select one: |
True |
Information systems consist of people, procedures, software, hardware, data, and the Internet. Select one: |
True |
Programs used to secretly record an individual’s activities on the Internet are called _______. Select one: |
Spyware |
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical. Select one: |
True |
Privacy concerns the collection and use of data about individuals. Select one: |
True |
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites. Select one: |
True |
The archiving and search features of the web make your online identity available indefinitely. Select one: |
True |
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. Select one: |
Employee-monitoring software |
Identity theft and mistaken identity are the same. Select one: |
False |
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for. Select one: |
False |
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. Select one: |
True |
The process of coding information to make it unreadable except to those who have a special piece of information known as a key. Select one: |
Encryption |
These are used by advertisers to keep track of your web activity as you move from one site to the next. Select one: |
Third-party cookies |
This law gives you the right to look at your personal records held by government agencies. Select one: |
Freedom of Information Act |
Spy removal programs are designed to detect and remove various types of privacy threats. Select one: |
True |
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return? Select one: |
Internet scam |
Free computer games and free screen saver programs are typical carriers of _______. Select one: |
Trojan horses |
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image. Select one: |
True |
It is highly likely that each one of us has an electronic profile created by information resellers. Select one: |
True |
The most common protocol for website encryption is https (Hyper Text Transfer Protocol Secure). Select one: |
True |
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft. Select one: |
False |
Which of the following is not malware? Select one: |
Ad-Aware |
Small data files that are deposited on a user’s hard disk when they visit a website are called _______. Select one: |
Cookies |
Computer criminals that create and spread viruses are punished under this law. Select one: |
Computer Fraud and Abuse Act |
A(n) _______ acts as a security buffer between a corporation’s private network and all external networks. Select one: |
Firewall |
Which among the following is a way to shut down an ISP or website? Select one: |
Denial of service attack |
Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. Select one: |
True |
The most significant concerns for implementation of computer technology involve _______, security, and ethics. Select one: |
Privacy |
The essential element that controls how computers are used is a law. Select one: |
False |
This type of computer criminal creates and distributes malicious programs. Select one: |
Cracker |
Biometric scanning devices are used to scan employee identification cards. Select one: |
False |
Which of the following is not a measure to protect computer security? Select one: |
Keeping the same password on all systems consistently |
Corporations often use this to prevent copyright violations. Select one: |
Digital rights management (DRM) |
Which type of program would likely be used by investigators to record a potential suspects’ Internet activities? Select one: |
Keystroke logger |
A program that replicates itself and clogs computers and networks. Select one: |
Worm |
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. Select one: |
Dictionary attack |
A tracking cookie is used by an advertising company to keep track of your web activity as you move from one site to the next. Select one: |
True |
Computer Essentials 9
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price