Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers in a Changing Society
Quiz 4: Network and Internet Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
____________________ access refers to individuals gaining access to a computer, network, file, or other resource without permission.
Question 62
Multiple Choice
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities-usually to buy products or services in that person's name.
Question 63
Multiple Choice
Repeated threats or other harassment carried out online between adults is referred to as ____.
Question 64
Multiple Choice
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.
Question 65
Short Answer
In businesses, access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
Question 66
Multiple Choice
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.
Question 67
Multiple Choice
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
Question 68
Short Answer
____________________ includes any illegal act involving a computer.
Question 69
Multiple Choice
Case-Based Critical Thinking Questions Case 9-1 Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.
Question 70
Short Answer
Biometric access systems use a(n)____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.