Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Succeeding with Technology
Quiz 11: Computer Crime and Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 21
True/False
Today's virus scanners are programmed to detect hundreds of thousands of different viruses, worms, Trojan horses, and other potentially unwanted applications. _________________________
Question 22
True/False
Each time you use software, listen to music, read a book or newspaper article, or see a movie, you are enjoying someone else's physical property. _________________________
Question 23
True/False
Protection of intellectual property can take many forms, including copyrights, trademarks, trade secrets, and patents. _________________________
Question 24
True/False
The Sarbanes-Oakley Act of 2002 fights corporate corruption by imposing stringent reporting requirements and internal controls on electronic financial records and transactions. _________________________
Question 25
True/False
Social-terrorism is a form of terrorism that uses attacks over the Internet to intimidate and harm a population. _________________________
Question 26
True/False
Microsoft has, in the past, extended a hand to the hacking community, hoping to get black-hat hackers on its side. _________________________
Question 27
True/False
Computer forensics is the process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities. _________________________
Question 28
True/False
ID cards may contain forms of identification in a magnetic strip or in a microchip, as is found in a(n) knowledge card. _________________________
Question 29
True/False
Retinal scanning analyzes the pattern of blood vessels at the back of the eye. _________________________
Question 30
True/False
Speech recognition, also called speaker authentication, identifies a user by the sound of his or her voice. _________________________
Question 31
True/False
The system administrator is responsible for setting the access rights of users and for setting the permissions on system resources. _________________________
Question 32
True/False
Most Wi-Fi networks are centered around a device called a(n) portal point. _________________________
Question 33
True/False
A social engineer may go junkyard diving; that is, rummaging through trash to steal credit card numbers or other personal information. _________________________
Question 34
True/False
In distributed denial-of-service attacks, many computers are used to launch simultaneous repeated requests at a Web server in order to overwhelm it so that it is unable to function. _________________________