Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Today and Tomorrow Study Set 3
Quiz 9: Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack. _________________________
Question 22
Multiple Choice
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
Question 23
True/False
To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
Question 24
True/False
The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL) . _________________________
Question 25
Multiple Choice
Most tracking software do not ____.
Question 26
True/False
Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring. _________________________
Question 27
Multiple Choice
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.
Question 28
True/False
For an even higher level of security than a scheduled backup, presence backup can be used. _________________________
Question 29
True/False
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________
Question 30
True/False
For extended power outages, generators are needed. _________________________
Question 31
True/False
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software . _________________________
Question 32
True/False
Mobile device management software secures and manages the mobile devices used in an organization. _________________________
Question 33
Multiple Choice
____ refers to the complete malfunction of a computer system.
Question 34
Multiple Choice
A hard drive that uses FDE is often referred to as a(n) ____.
Question 35
True/False
Numeric passwords are often called PINs . _________________________
Question 36
True/False
Due to the rising number of violent thefts of smartphones in major U.S. cities, cloud locks have been receiving increased attention. _________________________
Question 37
True/False
A(n) Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________
Question 38
True/False
Advocates of war driving and cyberstalking state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________
Question 39
True/False
Pharming attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize. _________________________