Professional Documents
Culture Documents
Internet activities?
Cookie
Global positioning system
Keystroke logger
Web bug keystroke logger
These programs record virtually everything you do on your computer and are used by employers
to search employee email and computer files.
Spyware
Freeware
Employee-monitoring software
Cookies Employee-monitoring software
This uses software to try thousands of common words sequentially in an attempt to gain
unauthorized access to a user's account.
Encryption
Firewall
Password
Dictionary attack Dictionary attack
Free computer games and free screen saver programs are typical carriers of _______.
DoS
worms
viruses
Trojan horses trojan horses
Employee
Hacker
Cracker
Keystroke logger cracker
The process of coding information to make it unreadable except to those who have a special
piece of information known as a key.
Restriction
Security
Protection
Encryption Encryption
This law gives you the right to look at your personal records held by government agencies.
Gramm-Leach-Bliley Act
Freedom of Information Act
Family Educational Rights and Privacy Act
Computer Fraud and Abuse Act Freedom of Information Act
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard
disk.
Illusion of anonymity
Browser cache
History files
Privacy mode privacy mode
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information
such as usernames and passwords.
Worm
Fake
Virus
Rogue Rogue
_______ is concerned with protecting software and data from unauthorized tampering or
damage.
Data backup
Physical security
Disaster recovery plan
Data security data security
Virus
Worm
Denial-of-service attack
Trojan horse worm
These are used by advertisers to keep track of your web activity as you move from one site to the
next.
Web bugs
History files
First-party cookies
Third-party cookies third-party cookies
Which of the following is the most widely used wireless network encryption for home wireless
networks?
WEP
WPE
WPA
WPA2WPA2
Small data files that are deposited on a user's hard disk when they visit a website are called
_______.
cookies
codes
cache
proxies cookies
A(n) _______ acts as a security buffer between a corporation's private network and all external
networks.
firewall
password
disaster recovery plan
virus checker firewall
Trojan horses
Viruses
Worms
Ad-Aware Ad-Aware
Malicious program
Internet scam
Theft
Data manipulation internet scam
Computer criminals that create and spread viruses are punished under this law.
Gramm-Leach-Bliley Act
Freedom of Information Act
Family Educational Rights and Privacy Act
Computer Fraud and Abuse Act Computer Fraud and Abuse Act
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or
embarrass another person.
Identity theft
Auction fraud
Cyberbullying
Snoopware cyberbullying
According to which law is it illegal for an owner of a commercial program to make backup
copies for their personal use and resell or give them away"
Programs used to secretly record an individual's activities on the Internet are called _______.
spyware
cookies
sniffer programs
keystroke loggers spyware
This is a legal concept that gives content creators the right to control use and distribution of their
work.
Piracy
Ethics
Copyright
Privacy copyright
Which of the following is not a measure to protect computer security?
Restricting access
Encrypting data
Copying data and storing it at a remote location
Keeping the same password on all systems consistently Keeping the same password on all
systems consistently
The most significant concerns for implementation of computer technology involve _______,
security, and ethics.
accuracy
property
privacy
access privacy
People that collect and sell personal data are called _______.
direct marketers
fund-raisers
information resellers
government agencies information resellers