Deck 9: Security and Privacy

Full screen (f)
exit full mode
Question
Smartphones are prone to attacks and are known to have OS flaws.
Use Space or
up arrow
down arrow
to flip the card.
Question
Read a Web site's piracy rules before providing any personal information.
Question
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
Question
Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.
Question
There are many options for protecting yourself against computer monitoring by your employer or the government.
Question
Opt-out procedures can be confusing and time consuming, and they do not always work well.
Question
The primary function of employee monitoring is to track employee productivity.
Question
To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.
Question
Public key encryption is also called asymmetric key encryption.
Question
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
Question
Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.
Question
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
Question
Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.
Question
The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.
Question
Security software protects devices against malware and other threats.
Question
One advantage of using a biometric access system is its very high accuracy.
Question
A disaster recovery plan is also called a business continuity plan.
Question
You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.
Question
A government database is a collection of data about people that is collected and maintained by private industry.
Question
Spyware is a possible privacy risk.
Question
Unintentional encryption  can result in huge data losses during or after a natural disaster or a terrorist attack. _________________________
Question
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
Question
To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address. _________________________
Question
The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL) . _________________________
Question
Most tracking software do not ____.

A) provide an option to remotely lock the device and display a message
B) send location information about stolen devices to the tracking company
C) survive operating system reinstallations and  hard drive reformats
D) automatically send videos and photos of possible suspects to law enforcement
Question
Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring. _________________________
Question
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A) security slot
B) system port
C) security opening
D) user lock
Question
For an even higher level of security than a scheduled backup,  presence backup  can be used. _________________________
Question
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________
Question
For extended power outages,  generators are needed. _________________________
Question
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software . _________________________
Question
Mobile device management  software secures and manages the mobile devices used in an organization. _________________________
Question
____  refers to the complete malfunction of a computer system.

A) Computer burnout
B) System failure
C) A spike
D) An interrupted power supply
Question
A hard drive that uses FDE is often referred to as a(n) ____.

A) full  hard drive
B) tracked  hard drive
C) spiked  hard drive
D) self-encrypting hard drive
Question
Numeric passwords are often called  PINs . _________________________
Question
Due to the rising number of violent thefts of smartphones in  major U.S. cities, cloud locks  have been receiving increased attention. _________________________
Question
A(n)  Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________
Question
Advocates of war driving and cyberstalking  state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________
Question
Pharming  ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize. _________________________
Question
One of the most obvious types of hardware loss is hardware theft . _________________________
Question
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens
Question
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

A) mirror
B) hotspot
C) hot file
D) backup
Question
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a(n) ____, which contains a built-in battery, can be used.

A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
Question
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A) codes of conduct
B) use guides
C) social media etiquette
D) operations path
Question
When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

A) private
B) organizational
C) public
D) token
Question
Encryption that uses 16-character keys is known as ____ .

A) strong 128-bit encryption
B) strong 256-bit encryption
C) military-strength 512-bit encryption
D) military-strength 1,024-bit encryption
Question
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

A) Authorization systems
B) Identity management systems
C) Programmed knowledge access systems
D) Access control systems
Question
Phishing schemes may use a technique called  ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites .

A) typosquatting
B) spamming
C) decrypting
D) encoding
Question
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

A) War driving
B) Wi-Fi  driving
C) Wi-Fi finding
D) E-stalking
Question
An example of a Wi-Fi security standard is ____.

A) WPA
B) SSL
C) WIP
D) OTP
Question
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) hub
C) firewall
D) bridge
Question
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security  patch to correct that vulnerability is available.

A) scripts
B) applets
C) file indexes
D) security holes
Question
____ are designed to withstand much more physical abuse than conventional devices.

A) Secured  devices
B) Ruggedized  devices
C) Malleable  devices
D) Flexible  devices
Question
To supplement backup procedures, businesses and other organizations should have a(n) ____.

A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
Question
A fraud or scam carried out through the Internet is a form of ____.

A) e-con
B) dot con
C) dot fraud
D) e-scam
Question
____ devices can withstand being dropped or submerged into water.

A) Malleable
B) Partitioned
C) Semirugged
D) Flexible
Question
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

A) Framing
B) Pharming
C) Profiling
D) Auctioning
Question
Public key encryption utilizes a pair of encryption  keys obtained through ____ .

A) Verizon
B) a Certificate Authority
C) an ISP
D) Microsoft
Question
A marketing activity that can be considered a privacy risk is ____.

A) security threads
B) watermarking
C) electronic profiling
D) microprinting
Question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

A) buddy site
B) alternate pad
C) hot site
D) white room
Question
By ____, you instruct companies with whom you do business not to share your personal information with third parties.

A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
Question
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client  has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

A) kill switch hard drives
B) surge suppressors
C) DataDots
D) keylogging software
Question
Using a private but unsecured Wi-Fi network without authorization is called war driving or ____________________.
Question
Computer crime, sometimes referred to as ____________________ includes any illegal act involving a computer.
Question
Collecting in-depth information about an individual is known as ____.

A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
Question
____________________  refers to the act of breaking into a computer or network.
Question
Computer hardware can ​be damaged by ____________________ fluctuations, heat, dust, static electricity, water, and abuse.
Question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

A) piracy policy
B) security policy
C) identity policy
D) privacy policy
Question
Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.

A) CEO
B) CIO
C) CPO
D) ​ CSO
Question
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.

A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
Question
For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address
Question
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.

A) firewall
B) anonymous
C) private
D) industrial
Question
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients  owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.

A) kill switches
B) surge suppressors
C) cable locks
D) keyloggers
Question
One common way to deal with spam that makes it to your computer is to use a(n) ____.

A) e-mail filter
B) war drive
C) encryption scheme
D) hot site
Question
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

A) opt out
B) disengage
C) build filters
D) block contact
Question
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

A) kill switch
B) throw-away
C) permanent
D) keylogging
Question
____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance
Question
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

A) proximity cards
B) presence technology
C) face recognition
D) video cards
Question
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.

A) protection history
B) consumer policy
C) privacy record
D) privacy policy
Question
A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Security and Privacy
1
Smartphones are prone to attacks and are known to have OS flaws.
True
2
Read a Web site's piracy rules before providing any personal information.
False
3
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
False
4
Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
There are many options for protecting yourself against computer monitoring by your employer or the government.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Opt-out procedures can be confusing and time consuming, and they do not always work well.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
The primary function of employee monitoring is to track employee productivity.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Public key encryption is also called asymmetric key encryption.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Security software protects devices against malware and other threats.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
One advantage of using a biometric access system is its very high accuracy.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
A disaster recovery plan is also called a business continuity plan.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
A government database is a collection of data about people that is collected and maintained by private industry.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Spyware is a possible privacy risk.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Unintentional encryption  can result in huge data losses during or after a natural disaster or a terrorist attack. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL) . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
Most tracking software do not ____.

A) provide an option to remotely lock the device and display a message
B) send location information about stolen devices to the tracking company
C) survive operating system reinstallations and  hard drive reformats
D) automatically send videos and photos of possible suspects to law enforcement
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
To facilitate using a computer lock, most portable computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A) security slot
B) system port
C) security opening
D) user lock
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
For an even higher level of security than a scheduled backup,  presence backup  can be used. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
For extended power outages,  generators are needed. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Mobile device management  software secures and manages the mobile devices used in an organization. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
____  refers to the complete malfunction of a computer system.

A) Computer burnout
B) System failure
C) A spike
D) An interrupted power supply
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
A hard drive that uses FDE is often referred to as a(n) ____.

A) full  hard drive
B) tracked  hard drive
C) spiked  hard drive
D) self-encrypting hard drive
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Numeric passwords are often called  PINs . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Due to the rising number of violent thefts of smartphones in  major U.S. cities, cloud locks  have been receiving increased attention. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
A(n)  Trojan horse is a type of malware that masquerades as something else-usually an application program. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
Advocates of war driving and cyberstalking  state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Pharming  ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
One of the most obvious types of hardware loss is hardware theft . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

A) floppy disks
B) IrDa cards
C) hard memories
D) USB security tokens
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

A) mirror
B) hotspot
C) hot file
D) backup
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a(n) ____, which contains a built-in battery, can be used.

A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A) codes of conduct
B) use guides
C) social media etiquette
D) operations path
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

A) private
B) organizational
C) public
D) token
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Encryption that uses 16-character keys is known as ____ .

A) strong 128-bit encryption
B) strong 256-bit encryption
C) military-strength 512-bit encryption
D) military-strength 1,024-bit encryption
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.

A) Authorization systems
B) Identity management systems
C) Programmed knowledge access systems
D) Access control systems
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
Phishing schemes may use a technique called  ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites .

A) typosquatting
B) spamming
C) decrypting
D) encoding
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

A) War driving
B) Wi-Fi  driving
C) Wi-Fi finding
D) E-stalking
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
An example of a Wi-Fi security standard is ____.

A) WPA
B) SSL
C) WIP
D) OTP
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

A) Trojan horse
B) hub
C) firewall
D) bridge
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security  patch to correct that vulnerability is available.

A) scripts
B) applets
C) file indexes
D) security holes
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
____ are designed to withstand much more physical abuse than conventional devices.

A) Secured  devices
B) Ruggedized  devices
C) Malleable  devices
D) Flexible  devices
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
To supplement backup procedures, businesses and other organizations should have a(n) ____.

A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
A fraud or scam carried out through the Internet is a form of ____.

A) e-con
B) dot con
C) dot fraud
D) e-scam
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
____ devices can withstand being dropped or submerged into water.

A) Malleable
B) Partitioned
C) Semirugged
D) Flexible
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

A) Framing
B) Pharming
C) Profiling
D) Auctioning
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
Public key encryption utilizes a pair of encryption  keys obtained through ____ .

A) Verizon
B) a Certificate Authority
C) an ISP
D) Microsoft
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
A marketing activity that can be considered a privacy risk is ____.

A) security threads
B) watermarking
C) electronic profiling
D) microprinting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

A) buddy site
B) alternate pad
C) hot site
D) white room
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
By ____, you instruct companies with whom you do business not to share your personal information with third parties.

A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client  has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

A) kill switch hard drives
B) surge suppressors
C) DataDots
D) keylogging software
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
Using a private but unsecured Wi-Fi network without authorization is called war driving or ____________________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
Computer crime, sometimes referred to as ____________________ includes any illegal act involving a computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
Collecting in-depth information about an individual is known as ____.

A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
____________________  refers to the act of breaking into a computer or network.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
Computer hardware can ​be damaged by ____________________ fluctuations, heat, dust, static electricity, water, and abuse.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

A) piracy policy
B) security policy
C) identity policy
D) privacy policy
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.

A) CEO
B) CIO
C) CPO
D) ​ CSO
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.

A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
For online shopping, signing up for free offers, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

A) encrypted e-mail address
B) throw-away e-mail address
C) non-recyclable e-mail address
D) second-hand e-mail address
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.

A) firewall
B) anonymous
C) private
D) industrial
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients  owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.

A) kill switches
B) surge suppressors
C) cable locks
D) keyloggers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
One common way to deal with spam that makes it to your computer is to use a(n) ____.

A) e-mail filter
B) war drive
C) encryption scheme
D) hot site
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

A) opt out
B) disengage
C) build filters
D) block contact
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

A) kill switch
B) throw-away
C) permanent
D) keylogging
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

A) Risk monitoring
B) Incident surveillance
C) Multimedia monitoring
D) Video surveillance
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

A) proximity cards
B) presence technology
C) face recognition
D) video cards
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.

A) protection history
B) consumer policy
C) privacy record
D) privacy policy
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.