Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Study Set 1
Quiz 9: Network and Internet Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there. _________________________
Question 22
Multiple Choice
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
Question 23
True/False
Strong passwords are passwords that are at least eight characters long. _________________________
Question 24
Multiple Choice
____ refers to the act of breaking into a computer or network.
Question 25
True/False
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) botherder or zombie computer. _________________________
Question 26
True/False
In spoofing, terrorists launch attacks via the Internet. _________________________
Question 27
True/False
Cuts or other changes to a finger may prevent access via a(n) keystroke reader. _________________________
Question 28
True/False
Phishing schemes use legitimate-looking e-mails to trick users into providing private information. _________________________
Question 29
True/False
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with. _________________________
Question 30
True/False
To avoid the need to obtain the recipient's public key before sending that person an encrypted e-mail, proprietary encrypted e-mail can be used. _________________________
Question 31
Multiple Choice
According to a recent study, the total cost per data breach in ____ is $5.4 million-the highest of any country.
Question 32
True/False
A(n) denial of service (DoS) attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it cannot handle legitimate requests any longer. _________________________