Deck 43: Machine-Level Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/15
Play
Full screen (f)
Deck 43: Machine-Level Security
1
Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data.
A) RFID
B) RAID
C) WPA
D) OnTrack
A) RFID
B) RAID
C) WPA
D) OnTrack
B
2
An item such as a smart card is an example of the ____ form of authentication.
A) something you know
B) something you have
C) something about you
D) biometric
A) something you know
B) something you have
C) something about you
D) biometric
B
3
The only time it is considered safe to send private information over a public wireless network is if it has ____.
A) HTTPS
B) WPA
C) WPA2
D) none of the above; a public wireless network is never safe for private information
A) HTTPS
B) WPA
C) WPA2
D) none of the above; a public wireless network is never safe for private information
D
4
Microsoft Windows uses ____ Drive Encryption.
A) FileVault
B) BitLocker
C) SFTP
D) WPA2
A) FileVault
B) BitLocker
C) SFTP
D) WPA2
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
5
An Internet-based crime is referred to as a(n)____ crime.
A) virtual
B) forensic
C) cyber
D) iTech
A) virtual
B) forensic
C) cyber
D) iTech
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ is commonly packaged with a new computer system.
A) token
B) keychain fob
C) rescue disk
D) scan
A) token
B) keychain fob
C) rescue disk
D) scan
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
7
A popular encryption method used to protect data that travels over a wireless network is ____.
A) WPA
B) FTPS
C) FTP
D) HTTPS
A) WPA
B) FTPS
C) FTP
D) HTTPS
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
8
Files can only be encrypted as they are opened.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
9
An individual who illegally downloads copyright-protected software is referred to as a ____.
A) cracker
B) plagiarist
C) pirate
D) hacker
A) cracker
B) plagiarist
C) pirate
D) hacker
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
10
Internet-based backup services in the cloud are a popular way to back up files for many users.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
11
The Mac computer employs the ____ system to encrypt its file data.
A) BitLocker Drive
B) FileVault
C) File Transfer Protocol
D) digital certificate
A) BitLocker Drive
B) FileVault
C) File Transfer Protocol
D) digital certificate
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
12
A common form of authentication is a ____.
A) password
B) computer name
C) keystroke
D) RAID
A) password
B) computer name
C) keystroke
D) RAID
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
13
Many businesses protect valuable information on a computer by limiting who uses it.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
14
Information security is a growing concern due to the amount of important and sometimes private information stored digitally.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
15
Biometrics uses a token system to authenticate users of a device.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck