Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Essentials
Quiz 8: Protecting People and Information
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
What type of computer virus finds your email contacts and sends itself to those accounts?
Question 62
Multiple Choice
Who uses hacking code on Web sites to click-and-point their way into systems to cause damage or spread viruses?
Question 63
Multiple Choice
If you were typing a sensitive message to your manager and you wanted to ensure that no one could read it but the person you were sending it to,what should you do to the message?
Question 64
Multiple Choice
When you purchase copyrighted software,what actually are you paying for?
Question 65
Multiple Choice
What is the name of the new anti-Spam bill?
Question 66
Multiple Choice
What type of hardware and/or software should you install to protect your computer from intruders entering into your system from your network connection?
Question 67
Multiple Choice
What is the most prevalent type of computer virus?
Question 68
Multiple Choice
What is intangible creative work that is embodied in physical form?
Question 69
Multiple Choice
Which of the following do viruses harm?
Question 70
Multiple Choice
Which of the following records logons and deletions?
Question 71
Multiple Choice
What software should you install to protect your computer from computer viruses?
Question 72
Multiple Choice
Which of the following examines information passing through network switches,hubs,or routers?
Question 73
Multiple Choice
Which of the following can not be used for biometrics?
Question 74
Multiple Choice
What type of access authentication system uses your physical characteristics to determine if you should,or should not,have access to a computer system?
Question 75
Multiple Choice
What type of software should you install to protect yourself from identify theft?
Question 76
Multiple Choice
If you were trying to access your campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus,what type of attack would you be experiencing?