MISY6 – Flashcard

Unlock all answers in this set

Unlock answers
question
An internet-based crime is referred to as a ____ crime.
answer
cyber
question
An individual who illegally downloads copyrighted-protected software is referred to as a ____.
answer
pirate
question
information security is implemented at the individual machine level, the computer network level, and the ____ level.
answer
internet
question
A common form of authentication is a ____.
answer
password
question
an item such as a smart card is an example of the _____ form of authentication
answer
something you have
question
the Mac computer employs the ____ system to encrypt its file data.
answer
FileVault
question
through the use of ____, data is secured when it is stored and transported over a network.
answer
encryption
question
a popular encryption method used to protect data that travels over a network is ____ .
answer
WPA
question
a ____ is commonly packaged with a new computer system.
answer
rescue disk
question
businesses prefer to use technology known as ____ to create an exact copy of their files for backup.
answer
RAID
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
answer
user
question
the job of the ____ administrator is to control who has access to various network resources such as files and folders.
answer
network
question
you enter the wrong GPS position for the start point on a trip you are about to take: this is an example of ____.
answer
a data entry error
question
People's mistakes can lead t problems with ____ of computer systems and information.
answer
security,accuracy,reliability
question
businesses are working to control information ____ by not allowing employees to store important data on their laptop computers.
answer
theft
question
stolen information can be used by all of the following EXCEPT ____ .
answer
government agencies to garnish wages
question
corporate network administrators have the right to do all of the following EXCEPT ____ .
answer
install a web cam in an employee's home
question
when starting a new job, you may need to sign a ____ that defines acceptable and unacceptable uses of computer and network resources.
answer
network usage policy
question
to protect your wireless devices and the information they hold, you should set up your ____ to only connect to the SSIDs of your computers.
answer
router
question
in a Wi-Fi network, ____ can be configured to help protect your security.
answer
access points
question
which of the following is NOT a realistic way to ensure Internet security?
answer
Avoid client/server networks
question
a company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hat
question
in a practice called ____ ,someone may manipulate people into performing actions of divulging confidential information on the Internet.
answer
social engineering
question
an important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
question
a ____ ma be used to censor data that may bot be dangerous but may be undesirable.
answer
firewall
question
a ____ allows hackers to gain access to important code or information in a software program.
answer
security hole
question
software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
answer
updates
question
criminals collect items such as credit card numbers without the knowledge of the user through the use of ____ .
answer
spyware
question
a ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
answer
zombie
question
all of the following help keep your information secure EXCEPT ____ .
answer
accessing P2P networks
question
all fo the following are examples of malware EXCEPT ____ .
answer
updates
question
in a distributed denial-of-service (DDoS) attack, the services of a ____ can be halted.
answer
Internet server
question
The ____ was established to secure and monitor security risks to the U.S. networks and the internet.
answer
US-CERT
question
you can protect yourself from identity theft by using ____ when transmitting information over the network connections.
answer
encryption
question
Sites such as eBay are a popular target for ____ .
answer
Internet fraud
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New