Filters
Question type

Study Flashcards

Discuss the purpose of kill switches and describe how they function.

Correct Answer

verifed

verified

Due to the rising number of violent thef...

View Answer

Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.


A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens

Correct Answer

verifed

verified

Public key encryption is also called asymmetric key encryption.

Correct Answer

verifed

verified

A fraud or scam carried out through the Internet is a form of ____.


A) e-con
B) dot con
C) dot fraud
D) e-scam

Correct Answer

verifed

verified

Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.

Correct Answer

verifed

verified

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.


A) opt out
B) disengage
C) build filters
D) block contact

Correct Answer

verifed

verified

____________________ occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but is not as represented.

Correct Answer

verifed

verified

Online auc...

View Answer

Discuss the features and benefits of continuous data protection.

Correct Answer

verifed

verified

For an even higher level of security tha...

View Answer

Collecting in-depth information about an individual is known as ____.


A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling

Correct Answer

verifed

verified

The primary function of employee monitoring is to track employee productivity.

Correct Answer

verifed

verified

Access for each employee at a company should be limited to only the resources needed for his or her job (referred to as the ____________________) and the company should monitor for any attempts to access off-limit resources.

Correct Answer

verifed

verified

Principle ...

View Answer

Computer crime, sometimes referred to as ____________________ includes any illegal act involving a computer.

Correct Answer

verifed

verified

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.


A) protection history
B) consumer policy
C) privacy record
D) privacy policy

Correct Answer

verifed

verified

For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.


A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address

Correct Answer

verifed

verified

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.


A) codes of conduct
B) use guides
C) social media etiquette
D) operations path

Correct Answer

verifed

verified

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.


A) piracy policy
B) security policy
C) identity policy
D) privacy policy

Correct Answer

verifed

verified

____ are designed to withstand much more physical abuse than conventional devices.


A) Secured  devices
B) Ruggedized  devices
C) Malleable  devices
D) Flexible  devices

Correct Answer

verifed

verified

Advocates of war driving and cyberstalking  state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________

Correct Answer

verifed

verified

____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.


A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance

Correct Answer

verifed

verified

A disaster recovery plan is also called a business continuity plan.

Correct Answer

verifed

verified

Showing 81 - 100 of 100

Related Exams

Show Answer