Professional Documents
Culture Documents
Course-wide Content
Animations
Multiple Choice Quiz 2
(Se e re late d page s)
C areers
Environment
Results Reporter
Ethics
Explore
Making IT Work
DVD Direct
Tips Out of 10 questions, you answered 8 correctly with a final grade of 80%
Privacy
8 correct (80%)
C hapte r 9 2 incorrect (20%)
Quizzes 0 unanswered
Multiple C hoice Quiz 1 (0%)
Multiple Choice Qui...
Matching Quiz 1 Your Results:
Matching Quiz 2
More Resources The correct answer for each question is indicated by a .
Flashcards
1 Which of the three privacy issues relates to the responsibility of those who have data to control who is able to use that
INCORRECT data?
A) access
B) accuracy
C) property
D) security
2 CORRECT What is the illegal assumption of someone's identity for the purposes of economic gain called?
A) fraud
B) identity theft
C) monitory transgression
D) scamming
B) traditional
C) Web bug
D) first-party
4 CORRECT These programs record every activity and keystroke made on a computer system.
B) Web bug
C) virus
D) worm
5 CORRECT Individuals who gain unauthorized access to your computer or computers that contain information about others:
A) hackers
B) cryptographers
C) encoders
D) crackers
6 CORRECT This special type of virus fills a computer system with self-replicating information, clogging the system so that its
operations are slowed or stopped.
A) firewall
B) keystroke
C) worm
D) zombie
7 CORRECT This type of attack attempts to slow down or stop a computer system or network by flooding it with requests for
information and data.
A) cracker
B) denial of service
C) hacker
D) Trojan horse
8 CORRECT This type of attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized
access to a user's account.
A) denial of service
B) password
C) dictionary
D) virus
http://highered.mheducation.com/sites/0073516899/student_view0/chapter9/multiple_choice_quiz_2.html 1/2
9/16/2017 Multiple Choice Quiz 2
9 CORRECT One of the best-known wireless encryption protocols is:
A) DRM
B) HIPAA
C) VPN
D) WPA2
B) hacking
C) plagiarism
D) software piracy
My Instructor: HTML
My TA: HTML
Other: HTML
To le arn m ore about the book this we bsite supports, ple ase visit its Inform ation C e nte r.
Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
http://highered.mheducation.com/sites/0073516899/student_view0/chapter9/multiple_choice_quiz_2.html 2/2