Podcast
Questions and Answers
What is the primary focus of computer security?
What is the primary focus of computer security?
- Preventing cybercrime and Internet-based crimes
- Developing technically skilled hackers and crackers
- Protecting information, hardware, and software from unauthorized use (correct)
- Protecting individuals and organizations from theft and danger
What is the term for an Internet-based crime?
What is the term for an Internet-based crime?
- Malware
- Cybercrime (correct)
- Computer crime
- Hacking
What is the term for a program that has malicious intent?
What is the term for a program that has malicious intent?
- Virus
- Malware (correct)
- Trojan horse
- Worm
What is the primary characteristic of a virus?
What is the primary characteristic of a virus?
What is the term for technically skilled persons who try to get unauthorized access within a computer system or a network?
What is the term for technically skilled persons who try to get unauthorized access within a computer system or a network?
What is the term for the unauthorized use of a computer or computer network to commit illegal acts?
What is the term for the unauthorized use of a computer or computer network to commit illegal acts?
What happens to cookies when you visit a website again?
What happens to cookies when you visit a website again?
How are most computer viruses typically transmitted to a user's system?
How are most computer viruses typically transmitted to a user's system?
What is the primary purpose of tracking cookies?
What is the primary purpose of tracking cookies?
What is the default format of data sent over the Internet?
What is the default format of data sent over the Internet?
What is the primary function of antivirus software?
What is the primary function of antivirus software?
What is a characteristic of a Trojan horse?
What is a characteristic of a Trojan horse?
What is the purpose of encryption?
What is the purpose of encryption?
What is the difference between the 'http' and 'https' protocols?
What is the difference between the 'http' and 'https' protocols?
Why is it important to update antivirus software regularly?
Why is it important to update antivirus software regularly?
What happens when you check the 'keep me logged in' box on a website?
What happens when you check the 'keep me logged in' box on a website?
What is the effect of a worm on a computer system?
What is the effect of a worm on a computer system?
What is a common tactic used by recent Trojan horses to deceive users?
What is a common tactic used by recent Trojan horses to deceive users?
What is the primary purpose of computer ethics guidelines?
What is the primary purpose of computer ethics guidelines?
Which of the following is a common computer ethics issue involved in intellectual property rights?
Which of the following is a common computer ethics issue involved in intellectual property rights?
What is the purpose of a firewall in a computer system?
What is the purpose of a firewall in a computer system?
What should you do if you receive an email from your bank asking you to change your password for security reasons?
What should you do if you receive an email from your bank asking you to change your password for security reasons?
What is the purpose of a CAPTCHA?
What is the purpose of a CAPTCHA?
What is a characteristic of a Trojan horse malware?
What is a characteristic of a Trojan horse malware?
What is the primary focus of Chapter Five in the computing skills course?
What is the primary focus of Chapter Five in the computing skills course?
What is the main objective of protecting against unauthorized access and unauthorized use?
What is the main objective of protecting against unauthorized access and unauthorized use?
What is the term for the practice of protecting against unauthorized access and use of computing systems?
What is the term for the practice of protecting against unauthorized access and use of computing systems?
What is malware, according to the chapter?
What is malware, according to the chapter?
What is the focus of the topic of computer ethics in the chapter?
What is the focus of the topic of computer ethics in the chapter?
What is the purpose of encryption in computing, according to the chapter?
What is the purpose of encryption in computing, according to the chapter?
Flashcards are hidden until you start studying