Filters
Question type

Study Flashcards

The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________

Correct Answer

verifed

verified

Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________

Correct Answer

verifed

verified

Why should you be concerned about computer security?

Correct Answer

verifed

verified

Today, there are a number of security co...

View Answer

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.


A) opt out
B) disengage
C) build filters
D) block contact

Correct Answer

verifed

verified

By ____, you instruct companies you do business with that they cannot share your personal data with third parties.


A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them

Correct Answer

verifed

verified

Cookies and spyware are possible privacy risks.

Correct Answer

verifed

verified

A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk. _________________________

Correct Answer

verifed

verified

There are many options for protecting yourself against computer monitoring by your employer or the government.

Correct Answer

verifed

verified

The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.


A) Sarbanes-Oxley Act
B) USA Patriot Act
C) CAN-SPAM act
D) Junk Fax Prevention Act

Correct Answer

verifed

verified

  The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN. A) encrypted B) locked C) registered D) indexed The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.


A) encrypted
B) locked
C) registered
D) indexed

Correct Answer

verifed

verified

Collecting in-depth information about an individual is known as ____.


A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling

Correct Answer

verifed

verified

The U.S. ____________________ Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.

Correct Answer

verifed

verified

Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.

Correct Answer

verifed

verified

____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.


A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software

Correct Answer

verifed

verified

Describe e-mail filters.

Correct Answer

verifed

verified

Custom e-mail filters are used to route ...

View Answer

A growing illegal use of computer monitoring software is for a hacker to use a(n)____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.

Correct Answer

verifed

verified

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.


A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting

Correct Answer

verifed

verified

To comply with truth-in-advertising laws, a(n)unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________

Correct Answer

verifed

verified

____________________ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.

Correct Answer

verifed

verified

When spam is sent via IM it is called ____.


A) spoof
B) phish
C) spim
D) junk

Correct Answer

verifed

verified

Showing 21 - 40 of 100

Related Exams

Show Answer