An individual who illegally downloads copyrighted-protected software is referred to as a ____.
information security is implemented at the individual machine level, the computer network level, and the ____ level.
through the use of ____, data is secured when it is stored and transported over a network.
businesses prefer to use technology known as ____ to create an exact copy of their files for backup.
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
the job of the ____ administrator is to control who has access to various network resources such as files and folders.
you enter the wrong GPS position for the start point on a trip you are about to take: this is an example of ____.
a data entry error
People's mistakes can lead t problems with ____ of computer systems and information.
businesses are working to control information ____ by not allowing employees to store important data on their laptop computers.
stolen information can be used by all of the following EXCEPT ____ .
government agencies to garnish wages
corporate network administrators have the right to do all of the following EXCEPT ____ .
install a web cam in an employee's home
when starting a new job, you may need to sign a ____ that defines acceptable and unacceptable uses of computer and network resources.
network usage policy
to protect your wireless devices and the information they hold, you should set up your ____ to only connect to the SSIDs of your computers.
which of the following is NOT a realistic way to ensure Internet security?
Avoid client/server networks
in a practice called ____ ,someone may manipulate people into performing actions of divulging confidential information on the Internet.
an important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
a ____ allows hackers to gain access to important code or information in a software program.
software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
criminals collect items such as credit card numbers without the knowledge of the user through the use of ____ .
in a distributed denial-of-service (DDoS) attack, the services of a ____ can be halted.
The ____ was established to secure and monitor security risks to the U.S. networks and the internet.
you can protect yourself from identity theft by using ____ when transmitting information over the network connections.