Filters
Question type

Study Flashcards

How do firewalls work?

Correct Answer

verifed

verified

Firewalls act as a security buffer betwe...

View Answer

Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.

Correct Answer

verifed

verified

Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.

Correct Answer

verifed

verified

Small data files that are deposited on a user's hard disk when they visit a website are called _______.


A) cookies
B) codes
C) cache
D) proxies

Correct Answer

verifed

verified

Which among the following is a way to shut down an ISP or website?


A) Denial of service attack
B) Viruses
C) Trojan horses
D) Worms

Correct Answer

verifed

verified

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?


A) Malicious program
B) Internet scam
C) Theft
D) Data manipulation

Correct Answer

verifed

verified

Spy removal programs are designed to detect and remove various types of privacy threats.

Correct Answer

verifed

verified

_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

Correct Answer

verifed

verified

A tracking cookie is used by an advertising company to keep track of your web activity as you move from one site to the next.

Correct Answer

verifed

verified

It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.

Correct Answer

verifed

verified

Information systems consist of people, procedures, software, hardware, data, and the Internet.

Correct Answer

verifed

verified

_______ is the illegal assumption of someone's identity for the purposes of economic gain.

Correct Answer

verifed

verified

Biometric scanning devices are used to scan employee identification cards.

Correct Answer

verifed

verified

Identity theft and mistaken identity are the same.

Correct Answer

verifed

verified

Which of the following is not a measure to protect computer security?


A) Restricting access
B) Encrypting data
C) Copying data and storing it at a remote location
D) Keeping the same password on all systems consistently

Correct Answer

verifed

verified

_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.

Correct Answer

verifed

verified

_______ scanning devices use fingerprints and iris scanners to identify individuals.

Correct Answer

verifed

verified

_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

Correct Answer

verifed

verified

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.

Correct Answer

verifed

verified

Which of the following is the most widely used wireless network encryption for home wireless networks?


A) WEP
B) WPE
C) WPA
D) WPA2

Correct Answer

verifed

verified

Showing 41 - 60 of 78

Related Exams

Show Answer