18 Questions
What is the difference between Full Disk Encryption (FDE) and a self-encrypting hard drive?
FDE encrypts everything on the storage medium, while a self-encrypting hard drive is a hard drive itself using FDE.
How does computer tracking software help in finding a lost or stolen PC?
Computer tracking software sends out identifying data via the Internet, which can be used by law enforcement to recover the PC.
What is the purpose of a kill switch in the context of protecting against hardware loss?
A kill switch is software used to destroy sensitive data on a stolen or lost PC.
How do ruggedized PCs differ from conventional hardware in terms of hardware care?
Ruggedized PCs are designed for more abuse than conventional hardware, requiring less delicate handling.
What is the role of a surge suppressor in protecting hardware from damage?
A surge suppressor protects hardware from damage due to electrical fluctuations.
How does an Uninterruptible Power Supply (UPS) contribute to hardware protection?
A UPS provides continuous power to a computer system for a period after the power goes off, preventing data loss and hardware damage.
What is a digital watermark?
A subtle alteration to a digital item that can be retrieved to identify the owner of the item.
What are some technologies used for protecting U.S. currency?
Special paper with digital watermarks, holograms, RFID tags, and hard-to-reproduce content.
Why should businesses be concerned about information privacy?
Businesses need to be concerned about the expense, damage to reputation, and possible lawsuits.
What is a marketing database?
A collection of data about people used for marketing purposes, obtained through online and offline purchases, public information, etc.
How can businesses protect against software piracy?
By implementing protection measures such as digital watermarks, holograms, RFID tags, and hard-to-reproduce content.
What are some privacy challenges related to web activity and e-mail?
Concerns include privacy breaches, unauthorized intrusion, and lack of control over collected information.
What is continuous data protection (CDP)?
Enables data backups to be made on a continual basis
Explain what a disaster-recovery plan is.
Spells out what an organization will do to prepare for and recover from a disruptive event
How can businesses and individuals protect against software piracy?
Educating businesses and consumers, strengthening antipiracy laws, using holograms, mandatory product registration/activation, and monitoring online auction sites/lawsuits
What is digital counterfeiting and how can it be prevented?
Digital counterfeiting is the illegal copying of currency, checks, collectibles, etc. Prevention methods include new currency designs with features like microprinting, watermarks, and security threads.
Why is it important for businesses and individuals to have backup and disaster recovery plans?
To minimize data loss and downtime in case of hardware failure, disasters, or other disruptive events
What is one way to secure backup media?
Storing backup media at secure remote locations
Test your knowledge on protecting against hardware loss, damage, and system failure with this quiz based on Chapter 15 of 'Understanding Computers, 12th Edition'. Topics include full disk encryption, self-encrypting hard drives, computer tracking software, and kill switch technology.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free