Filters
Question type

Study Flashcards

Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.

Correct Answer

verifed

verified

Copyright is a legal concept that gives ...

View Answer

Which of the following is not malware?


A) Trojan horses
B) Viruses
C) Worms
D) Ad-Aware

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Explain cookies and identify the difference between first-party cookies and third-party cookies.

Correct Answer

verifed

verified

Cookies are small data files that are de...

View Answer

_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

Correct Answer

verifed

verified

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.


A) Worm
B) Fake
C) Virus
D) Rogue

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

A) True
B) False

Correct Answer

verifed

verified

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?


A) Malicious program
B) Internet scam
C) Theft
D) Data manipulation

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Information systems consist of people, procedures, software, hardware, data, and the Internet.

A) True
B) False

Correct Answer

verifed

verified

_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

Correct Answer

verifed

verified

These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files.


A) Spyware
B) Freeware
C) Employee-monitoring software
D) Cookies

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is the most widely used wireless network encryption for home wireless networks?


A) WEP
B) WPE
C) WPA
D) WPA2

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

_______ is concerned with protecting software and data from unauthorized tampering or damage.


A) Data backup
B) Physical security
C) Disaster recovery plan
D) Data security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The essential element that controls how computers are used is a law.

A) True
B) False

Correct Answer

verifed

verified

The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).

A) True
B) False

Correct Answer

verifed

verified

Explain how a web bug works.

Correct Answer

verifed

verified

Web bugs are invisible images or HTML co...

View Answer

A _______ (acronym or 3 words) attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.

Correct Answer

verifed

verified

denial of ...

View Answer

Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

A) True
B) False

Correct Answer

verifed

verified

Privacy concerns the collection and use of data about individuals.

A) True
B) False

Correct Answer

verifed

verified

Identity theft and mistaken identity are the same.

A) True
B) False

Correct Answer

verifed

verified

It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 78

Related Exams

Show Answer