Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Today
Quiz 9: Network and Internet Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
____ can be extremely distressing for victims,can take years to straighten out,and can be very expensive.
Question 62
Short Answer
A(n)____________________ access system is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Question 63
Multiple Choice
-The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.
Question 64
Short Answer
____________________ includes any illegal act involving a computer.
Question 65
Multiple Choice
Phishing schemes may use a technique called ____,which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
Question 66
Multiple Choice
Case 9-1 Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network. -Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____,which appears as asterisks on the screen as it is being entered.
Question 67
Multiple Choice
The ____,implemented in 2001,grants federal authorities expanded surveillance and intelligence-gathering powers,such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.
Question 68
Multiple Choice
The ____ includes provisions to combat cyberterrorism,including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
Question 69
Essay
In businesses,access control systems are often integrated into a comprehensive ____________________ system designed to manage users' access to enterprise systems.
Question 70
Multiple Choice
Case 9-1 Melissa is the network administrator for a small publishing company.As network administrator,she is in charge of maintaining the security of all the computers that are part of the company's network. -One of the first items that Melissa installed was a(n) ____,which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.
Question 71
Multiple Choice
Repeated threats or other harassment carried out online between adults is referred to as ____.
Question 72
Short Answer
Biometric access systems use a(n)____________________ in conjunction with software and a database to match the supplied biometric data with the biometric data previously stored in the database to identify and authenticate an individual.