Filters
Question type

____ key, also referred to as "personal mode," is a type of WPA used on most home networks.


A) Authorized
B) Pre-authorized
C) Shared
D) Pre-shared

Correct Answer

verifed

verified

Many businesses that collect data online offer a(n) privacy policy that describes how your personal data might be used, whether it might be sold or distributed, and how it might be protected from unauthorized access._________________________

Correct Answer

verifed

verified

A Trojan ant is a computer program that seems to perform one function while actually doing something else, and is not designed to make copies of itself._________________________

Correct Answer

verifed

verified

Personal information about your health, grades, charitable donations, and purchases is stored in a very limited number of places.

Correct Answer

verifed

verified

You can make copies for your own use and you can make copies under ____________________ regulations, which allow you to copy small excerpts of copyrighted works for use in educational materials and critical reviews.

Correct Answer

verifed

verified

One of the forms of malicious code is worms.Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.

Correct Answer

verifed

verified

-Unlike a virus, which is designed to sp...

View Answer

Web site ____________________, the process of intentionally blocking access to certain sites, is controversial.

Correct Answer

verifed

verified

In the United States, ____ prevents health care organizations from distributing patient information without written permission, and gives patients the right to amend incorrect or missing information in their records.


A) HIPAA
B) LIPAA
C) MIPAA
D) KIPAA

Correct Answer

verifed

verified

Gossip is defined as false and malicious statements published for the purpose of damaging the reputation of a living person._________________________

Correct Answer

verifed

verified

Some Trojan horses contain a virus or a worm, which can replicate and spread.Virus experts call this a ____ threat because it combines more than one type of malicious code.


A) blended
B) combo
C) confused
D) mixed-up

Correct Answer

verifed

verified

To access Windows Firewall when using Windows, type "____" in the Start menu's Search box.


A) Security
B) Firewall
C) Help
D) Start

Correct Answer

verifed

verified

____________________ is any technology that surreptitiously gathers information.

Correct Answer

verifed

verified

____ typically protect corporate logos and product names.


A) Trademarks
B) Patents
C) Copyrights
D) Privacy Policies

Correct Answer

verifed

verified

A ____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.


A) stampede
B) denial of service
C) rampage
D) buzz

Correct Answer

verifed

verified

Copyright law prohibits all copying.

Correct Answer

verifed

verified

____ violations take place when your personal information is distributed or your online activities are tracked without your permission.


A) Virus
B) Trojan
C) Privacy
D) Encryption

Correct Answer

verifed

verified

A virus clue is a section of code, such as a unique series of instructions, that can be used to identify a known virus or worm, much as a fingerprint is used to identify an individual._________________________

Correct Answer

verifed

verified

____ software is designed to analyze the flow of traffic entering your computer from a network.


A) Port connection
B) Wireless connection
C) Encryption
D) Firewall

Correct Answer

verifed

verified

The process of eradicating a virus-sometimes called "____"-might include deleting the virus code from files or deleting infected files.


A) disinfecting
B) spraying
C) exterminating
D) erasing

Correct Answer

verifed

verified

Explain how you can use a router instead of a firewall to protect your computer from intrusions.

Correct Answer

verifed

verified

As an alternative to firewall software, ...

View Answer

Showing 21 - 40 of 75

Related Exams

Show Answer