Filters
Question type

Study Flashcards

Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients  owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.


A) kill switches
B) surge suppressors
C) cable locks
D) keyloggers

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.

A) True
B) False

Correct Answer

verifed

verified

Numeric passwords are often called  PINs . _________________________

A) True
B) False

Correct Answer

verifed

verified

One common way to deal with spam that makes it to your computer is to use a(n) ____.


A) e-mail filter
B) war drive
C) encryption scheme
D) hot site

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security  patch to correct that vulnerability is available.


A) scripts
B) applets
C) file indexes
D) security holes

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An example of a Wi-Fi security standard is ____.


A) WPA
B) SSL
C) WIP
D) OTP

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client  has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?


A) kill switch hard drives
B) surge suppressors
C) DataDots
D) keylogging software

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

A(n) ____________________ is a software program that is installed without the permission or knowledge of the computer user, is designed to alter the way a computer operates, and can replicate itself to infect any new media it has access to.

Correct Answer

verifed

verified

computer v...

View Answer

Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software . _________________________

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.

Correct Answer

verifed

verified

possessed ...

View Answer

System failure can occur because of a hardware problem, a software problem, or computer sabotage.

A) True
B) False

Correct Answer

verifed

verified

Using a private but unsecured Wi-Fi network without authorization is called war driving or ____________________.

Correct Answer

verifed

verified

A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.


A) buddy site
B) alternate pad
C) hot site
D) white room

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

For increased security, ____________________ (using two different methods to authenticate a user) can be used.

Correct Answer

verifed

verified

two-factor authentic...

View Answer

You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.

A) True
B) False

Correct Answer

verifed

verified

Security software protects devices against malware and other threats.

A) True
B) False

Correct Answer

verifed

verified

____ devices can withstand being dropped or submerged into water.


A) Malleable
B) Partitioned
C) Semirugged
D) Flexible

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address. _________________________

A) True
B) False

Correct Answer

verifed

verified

____________________ involves pretending-typically via phone or e-mail-to be a bank officer, potential employer, IT employee, or other trusted individual in order to get the potential victim to supply personal information.

Correct Answer

verifed

verified

Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 100

Related Exams

Show Answer