CGS-1000 Chapter 9 NOTES PDF

Title CGS-1000 Chapter 9 NOTES
Author Gene's
Course BS Accountancy
Institution Saint Louis College
Pages 4
File Size 48.6 KB
File Type PDF
Total Downloads 90
Total Views 139

Summary

Helps you with your studies in the futures...


Description

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. Virus Fake Rogue Worm Rouge Which type of program would likely be used by investigators to record a potential suspects' Internet activities? Web bug Global positioning system Keylogger Cookie Keylogger ________ is the use of the Internet to send or post content intended to hurt or embarrass another person. Trojan horse attack Identity theft Zombie apocalypse Cyberbullying Cyberbullying This is a legal concept that gives content creators the right to control use and distribution of their work. Privacy Copyright Ethics Piracy Copyright ________ are used by advertising companies to keep track of your web activity as you move from one site to the next. Third-party cookies Sniffers First-party cookies Keyloggers Third-party cookies ________, a privacy issue, relates to the responsibility of controlling who is able to use data. Restriction Access Encryption Protection

Access

________ is concerned with protecting software and data from unauthorized tampering or damage. Data backup Data security Disaster recovery plan Physical security Data Security A ________ is a computer criminal who creates and distributes malicious programs or malware. hacker logger cracker cookie Hacker Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. History files Browser cache Privacy mode Illusion of anonymity Privacy Mode Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return? Internet scam Malicious program Theft Data manipulation

Internet Scam

This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account. Password Firewall Dictionary attack Encryption Dictionary attack A program that replicates itself and clogs computers and networks. Virus Denial-of-service attack Worm Trojan horse Worm

________ attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate. Phishing A Trojan horse A first-party cookie A third-party cookie Phishing Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft. False True False Your digital footprint can reveal more than you might wish to make public and have an impact beyond what you might imagine. True False True If copyright-protected music is uploaded to a website, it is legal to download it. True False False Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image. True False True The archiving and search features of the web make your online identity available indefinitely. True False False Information systems consist of people, procedures, software, hardware, data, and the Internet. True False True A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account. True

False False...


Similar Free PDFs