Deck 43: Machine-Level Security

Full screen (f)
exit full mode
Question
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.

A) RFID
B) RAID
C) WPA
D) OnTrack
Use Space or
up arrow
down arrow
to flip the card.
Question
An item such as a smart card is an example of the ____ form of authentication.

A) something you know
B) something you have
C) something about you
D) biometric
Question
The only time it is considered safe to send private information over a public wireless network is if it has ____.

A) HTTPS
B) WPA
C) WPA2
D) none of the above; a public wireless network is never safe for private information
Question
Microsoft Windows uses ____ Drive Encryption.

A) FileVault
B) BitLocker
C) SFTP
D) WPA2
Question
An Internet-based crime is referred to as a(n)____ crime.

A) virtual
B) forensic
C) cyber
D) iTech
Question
A ____ is commonly packaged with a new computer system.

A) token
B) keychain fob
C) rescue disk
D) scan
Question
A popular encryption method used to protect data that travels over a wireless network is ____.

A) WPA
B) FTPS
C) FTP
D) HTTPS
Question
Files can only be encrypted as they are opened.
Question
An individual who illegally downloads copyright-protected software is referred to as a ____.

A) cracker
B) plagiarist
C) pirate
D) hacker
Question
Internet-based backup services in the cloud are a popular way to back up files for many users.
Question
The Mac computer employs the ____ system to encrypt its file data.

A) BitLocker Drive
B) FileVault
C) File Transfer Protocol
D) digital certificate
Question
A common form of authentication is a ____.

A) password
B) computer name
C) keystroke
D) RAID
Question
Many businesses protect valuable information on a computer by limiting who uses it.
Question
Information security is a growing concern due to the amount of important and sometimes private information stored digitally.
Question
Biometrics uses a token system to authenticate users of a device.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/15
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 43: Machine-Level Security
1
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.

A) RFID
B) RAID
C) WPA
D) OnTrack
B
2
An item such as a smart card is an example of the ____ form of authentication.

A) something you know
B) something you have
C) something about you
D) biometric
B
3
The only time it is considered safe to send private information over a public wireless network is if it has ____.

A) HTTPS
B) WPA
C) WPA2
D) none of the above; a public wireless network is never safe for private information
D
4
Microsoft Windows uses ____ Drive Encryption.

A) FileVault
B) BitLocker
C) SFTP
D) WPA2
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
5
An Internet-based crime is referred to as a(n)____ crime.

A) virtual
B) forensic
C) cyber
D) iTech
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ is commonly packaged with a new computer system.

A) token
B) keychain fob
C) rescue disk
D) scan
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
7
A popular encryption method used to protect data that travels over a wireless network is ____.

A) WPA
B) FTPS
C) FTP
D) HTTPS
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
8
Files can only be encrypted as they are opened.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
9
An individual who illegally downloads copyright-protected software is referred to as a ____.

A) cracker
B) plagiarist
C) pirate
D) hacker
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
10
Internet-based backup services in the cloud are a popular way to back up files for many users.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
11
The Mac computer employs the ____ system to encrypt its file data.

A) BitLocker Drive
B) FileVault
C) File Transfer Protocol
D) digital certificate
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
12
A common form of authentication is a ____.

A) password
B) computer name
C) keystroke
D) RAID
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
13
Many businesses protect valuable information on a computer by limiting who uses it.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
14
Information security is a growing concern due to the amount of important and sometimes private information stored digitally.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
15
Biometrics uses a token system to authenticate users of a device.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 15 flashcards in this deck.