Deck 9: Security and Privacy

ملء الشاشة (f)
exit full mode
سؤال
Smartphones are prone to attacks and are known to have OS flaws.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Read a Web site's piracy rules before providing any personal information.
سؤال
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
سؤال
Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.
سؤال
There are many options for protecting yourself against computer monitoring by your employer or the government.
سؤال
Opt-out procedures can be confusing and time consuming, and they do not always work well.
سؤال
The primary function of employee monitoring is to track employee productivity.
سؤال
To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.
سؤال
Public key encryption is also called asymmetric key encryption.
سؤال
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
سؤال
Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.
سؤال
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
سؤال
Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.
سؤال
The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.
سؤال
Security software protects devices against malware and other threats.
سؤال
One advantage of using a biometric access system is its very high accuracy.
سؤال
A disaster recovery plan is also called a business continuity plan.
سؤال
You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.
سؤال
A government database is a collection of data about people that is collected and maintained by private industry.
سؤال
Spyware is a possible privacy risk.
سؤال
Unintentional encryption  can result in huge data losses during or after a natural disaster or a terrorist attack. _________________________
سؤال
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
سؤال
To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address. _________________________
سؤال
The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL) . _________________________
سؤال
Most tracking software do not ____.

A) provide an option to remotely lock the device and display a message
B) send location information about stolen devices to the tracking company
C) survive operating system reinstallations and  hard drive reformats
D) automatically send videos and photos of possible suspects to law enforcement
سؤال
Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring. _________________________
سؤال
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A) security slot
B) system port
C) security opening
D) user lock
سؤال
For an even higher level of security than a scheduled backup,  presence backup  can be used. _________________________
سؤال
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________
سؤال
For extended power outages,  generators are needed. _________________________
سؤال
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software . _________________________
سؤال
Mobile device management  software secures and manages the mobile devices used in an organization. _________________________
سؤال
____  refers to the complete malfunction of a computer system.

A) Computer burnout
B) System failure
C) A spike
D) An interrupted power supply
سؤال
A hard drive that uses FDE is often referred to as a(n) ____.

A) full  hard drive
B) tracked  hard drive
C) spiked  hard drive
D) self-encrypting hard drive
سؤال
Numeric passwords are often called  PINs . _________________________
سؤال
Due to the rising number of violent thefts of smartphones in  major U.S. cities, cloud locks  have been receiving increased attention. _________________________
سؤال
A(n)  Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________
سؤال
Advocates of war driving and cyberstalking  state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________
سؤال
Pharming  ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize. _________________________
سؤال
One of the most obvious types of hardware loss is hardware theft . _________________________
سؤال
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens
سؤال
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

A) mirror
B) hotspot
C) hot file
D) backup
سؤال
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a(n) ____, which contains a built-in battery, can be used.

A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
سؤال
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A) codes of conduct
B) use guides
C) social media etiquette
D) operations path
سؤال
When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

A) private
B) organizational
C) public
D) token
سؤال
Encryption that uses 16-character keys is known as ____ .

A) strong 128-bit encryption
B) strong 256-bit encryption
C) military-strength 512-bit encryption
D) military-strength 1,024-bit encryption
سؤال
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

A) Authorization systems
B) Identity management systems
C) Programmed knowledge access systems
D) Access control systems
سؤال
Phishing schemes may use a technique called  ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites .

A) typosquatting
B) spamming
C) decrypting
D) encoding
سؤال
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

A) War driving
B) Wi-Fi  driving
C) Wi-Fi finding
D) E-stalking
سؤال
An example of a Wi-Fi security standard is ____.

A) WPA
B) SSL
C) WIP
D) OTP
سؤال
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) hub
C) firewall
D) bridge
سؤال
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security  patch to correct that vulnerability is available.

A) scripts
B) applets
C) file indexes
D) security holes
سؤال
____ are designed to withstand much more physical abuse than conventional devices.

A) Secured  devices
B) Ruggedized  devices
C) Malleable  devices
D) Flexible  devices
سؤال
To supplement backup procedures, businesses and other organizations should have a(n) ____.

A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
سؤال
A fraud or scam carried out through the Internet is a form of ____.

A) e-con
B) dot con
C) dot fraud
D) e-scam
سؤال
____ devices can withstand being dropped or submerged into water.

A) Malleable
B) Partitioned
C) Semirugged
D) Flexible
سؤال
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

A) Framing
B) Pharming
C) Profiling
D) Auctioning
سؤال
Public key encryption utilizes a pair of encryption  keys obtained through ____ .

A) Verizon
B) a Certificate Authority
C) an ISP
D) Microsoft
سؤال
A marketing activity that can be considered a privacy risk is ____.

A) security threads
B) watermarking
C) electronic profiling
D) microprinting
سؤال
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

A) buddy site
B) alternate pad
C) hot site
D) white room
سؤال
By ____, you instruct companies with whom you do business not to share your personal information with third parties.

A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
سؤال
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client  has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

A) kill switch hard drives
B) surge suppressors
C) DataDots
D) keylogging software
سؤال
Using a private but unsecured Wi-Fi network without authorization is called war driving or ____________________.
سؤال
Computer crime, sometimes referred to as ____________________ includes any illegal act involving a computer.
سؤال
Collecting in-depth information about an individual is known as ____.

A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
سؤال
____________________  refers to the act of breaking into a computer or network.
سؤال
Computer hardware can ​be damaged by ____________________ fluctuations, heat, dust, static electricity, water, and abuse.
سؤال
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

A) piracy policy
B) security policy
C) identity policy
D) privacy policy
سؤال
Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.

A) CEO
B) CIO
C) CPO
D) ​ CSO
سؤال
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.

A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
سؤال
For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address
سؤال
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.

A) firewall
B) anonymous
C) private
D) industrial
سؤال
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients  owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.

A) kill switches
B) surge suppressors
C) cable locks
D) keyloggers
سؤال
One common way to deal with spam that makes it to your computer is to use a(n) ____.

A) e-mail filter
B) war drive
C) encryption scheme
D) hot site
سؤال
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

A) opt out
B) disengage
C) build filters
D) block contact
سؤال
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

A) kill switch
B) throw-away
C) permanent
D) keylogging
سؤال
____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance
سؤال
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

A) proximity cards
B) presence technology
C) face recognition
D) video cards
سؤال
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.

A) protection history
B) consumer policy
C) privacy record
D) privacy policy
سؤال
A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Security and Privacy
1
Smartphones are prone to attacks and are known to have OS flaws.
True
2
Read a Web site's piracy rules before providing any personal information.
False
3
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
False
4
Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
There are many options for protecting yourself against computer monitoring by your employer or the government.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
Opt-out procedures can be confusing and time consuming, and they do not always work well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
The primary function of employee monitoring is to track employee productivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
Public key encryption is also called asymmetric key encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Security software protects devices against malware and other threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
One advantage of using a biometric access system is its very high accuracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
A disaster recovery plan is also called a business continuity plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
A government database is a collection of data about people that is collected and maintained by private industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
Spyware is a possible privacy risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
Unintentional encryption  can result in huge data losses during or after a natural disaster or a terrorist attack. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL) . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
Most tracking software do not ____.

A) provide an option to remotely lock the device and display a message
B) send location information about stolen devices to the tracking company
C) survive operating system reinstallations and  hard drive reformats
D) automatically send videos and photos of possible suspects to law enforcement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A) security slot
B) system port
C) security opening
D) user lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
For an even higher level of security than a scheduled backup,  presence backup  can be used. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
For extended power outages,  generators are needed. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
Mobile device management  software secures and manages the mobile devices used in an organization. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
____  refers to the complete malfunction of a computer system.

A) Computer burnout
B) System failure
C) A spike
D) An interrupted power supply
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
A hard drive that uses FDE is often referred to as a(n) ____.

A) full  hard drive
B) tracked  hard drive
C) spiked  hard drive
D) self-encrypting hard drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
Numeric passwords are often called  PINs . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
Due to the rising number of violent thefts of smartphones in  major U.S. cities, cloud locks  have been receiving increased attention. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n)  Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
Advocates of war driving and cyberstalking  state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Pharming  ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
One of the most obvious types of hardware loss is hardware theft . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

A) mirror
B) hotspot
C) hot file
D) backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a(n) ____, which contains a built-in battery, can be used.

A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A) codes of conduct
B) use guides
C) social media etiquette
D) operations path
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

A) private
B) organizational
C) public
D) token
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Encryption that uses 16-character keys is known as ____ .

A) strong 128-bit encryption
B) strong 256-bit encryption
C) military-strength 512-bit encryption
D) military-strength 1,024-bit encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

A) Authorization systems
B) Identity management systems
C) Programmed knowledge access systems
D) Access control systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
Phishing schemes may use a technique called  ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites .

A) typosquatting
B) spamming
C) decrypting
D) encoding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

A) War driving
B) Wi-Fi  driving
C) Wi-Fi finding
D) E-stalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
An example of a Wi-Fi security standard is ____.

A) WPA
B) SSL
C) WIP
D) OTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) hub
C) firewall
D) bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security  patch to correct that vulnerability is available.

A) scripts
B) applets
C) file indexes
D) security holes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
____ are designed to withstand much more physical abuse than conventional devices.

A) Secured  devices
B) Ruggedized  devices
C) Malleable  devices
D) Flexible  devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
To supplement backup procedures, businesses and other organizations should have a(n) ____.

A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
A fraud or scam carried out through the Internet is a form of ____.

A) e-con
B) dot con
C) dot fraud
D) e-scam
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
____ devices can withstand being dropped or submerged into water.

A) Malleable
B) Partitioned
C) Semirugged
D) Flexible
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

A) Framing
B) Pharming
C) Profiling
D) Auctioning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
Public key encryption utilizes a pair of encryption  keys obtained through ____ .

A) Verizon
B) a Certificate Authority
C) an ISP
D) Microsoft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
A marketing activity that can be considered a privacy risk is ____.

A) security threads
B) watermarking
C) electronic profiling
D) microprinting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

A) buddy site
B) alternate pad
C) hot site
D) white room
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
By ____, you instruct companies with whom you do business not to share your personal information with third parties.

A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client  has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

A) kill switch hard drives
B) surge suppressors
C) DataDots
D) keylogging software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
Using a private but unsecured Wi-Fi network without authorization is called war driving or ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
Computer crime, sometimes referred to as ____________________ includes any illegal act involving a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
Collecting in-depth information about an individual is known as ____.

A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
____________________  refers to the act of breaking into a computer or network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
Computer hardware can ​be damaged by ____________________ fluctuations, heat, dust, static electricity, water, and abuse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

A) piracy policy
B) security policy
C) identity policy
D) privacy policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.

A) CEO
B) CIO
C) CPO
D) ​ CSO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.

A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.

A) firewall
B) anonymous
C) private
D) industrial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients  owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.

A) kill switches
B) surge suppressors
C) cable locks
D) keyloggers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
One common way to deal with spam that makes it to your computer is to use a(n) ____.

A) e-mail filter
B) war drive
C) encryption scheme
D) hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

A) opt out
B) disengage
C) build filters
D) block contact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

A) kill switch
B) throw-away
C) permanent
D) keylogging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

A) proximity cards
B) presence technology
C) face recognition
D) video cards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.

A) protection history
B) consumer policy
C) privacy record
D) privacy policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.