Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Today and Tomorrow Study Set 3
Quiz 9: Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Essay
Describe how to use e-mail filters.
Question 82
Short Answer
____________________ is the ability of one computing device to identify another device on the same network and determine its status.
Question 83
Short Answer
A(n) ____________________, is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it shuts down or simply can no longer handle requests, causing legitimate users to be denied service.
Question 84
Short Answer
____________________ occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but is not as represented.
Question 85
Essay
Discuss the features and benefits of continuous data protection.
Question 86
Short Answer
Personal firewalls can be stand-alone programs; they are also built into many operating systems (such as the ____________________ program).
Question 87
Short Answer
For increased security, ____________________ (using two different methods to authenticate a user) can be used.
Question 88
Short Answer
____________________ contain marketing and demographic data about people, such as where they live and what products they buy.
Question 89
Essay
List at least five strategies for virus prevention.
Question 90
Short Answer
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) ____________________.
Question 91
Short Answer
Access for each employee at a company should be limited to only the resources needed for his or her job (referred to as the ____________________) and the company should monitor for any attempts to access off-limit resources.