Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

An internet-based crime is referred to as a ____ crime.


An individual who illegally downloads copyrighted-protected software is referred to as a ____.


information security is implemented at the individual machine level, the computer network level, and the ____ level.


A common form of authentication is a ____.


an item such as a smart card is an example of the _____ form of authentication

something you have

the Mac computer employs the ____ system to encrypt its file data.


through the use of ____, data is secured when it is stored and transported over a network.


a popular encryption method used to protect data that travels over a network is ____ .


a ____ is commonly packaged with a new computer system.

rescue disk

businesses prefer to use technology known as ____ to create an exact copy of their files for backup.


____ permissions provide registered users with access to the files they need, while restricting access to private resources.


the job of the ____ administrator is to control who has access to various network resources such as files and folders.


you enter the wrong GPS position for the start point on a trip you are about to take: this is an example of ____.

a data entry error

People's mistakes can lead t problems with ____ of computer systems and information.


businesses are working to control information ____ by not allowing employees to store important data on their laptop computers.


stolen information can be used by all of the following EXCEPT ____ .

government agencies to garnish wages

corporate network administrators have the right to do all of the following EXCEPT ____ .

install a web cam in an employee's home

when starting a new job, you may need to sign a ____ that defines acceptable and unacceptable uses of computer and network resources.

network usage policy

to protect your wireless devices and the information they hold, you should set up your ____ to only connect to the SSIDs of your computers.


in a Wi-Fi network, ____ can be configured to help protect your security.

access points

which of the following is NOT a realistic way to ensure Internet security?

Avoid client/server networks

a company may hire a ____ hacker to learn about vulnerabilities in its system.


in a practice called ____ ,someone may manipulate people into performing actions of divulging confidential information on the Internet.

social engineering

an important function of a firewall is to protect all the ____ of a network or computer from undesirable data.


a ____ ma be used to censor data that may bot be dangerous but may be undesirable.


a ____ allows hackers to gain access to important code or information in a software program.

security hole

software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.


criminals collect items such as credit card numbers without the knowledge of the user through the use of ____ .


a ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.


all of the following help keep your information secure EXCEPT ____ .

accessing P2P networks

all fo the following are examples of malware EXCEPT ____ .


in a distributed denial-of-service (DDoS) attack, the services of a ____ can be halted.

Internet server

The ____ was established to secure and monitor security risks to the U.S. networks and the internet.


you can protect yourself from identity theft by using ____ when transmitting information over the network connections.


Sites such as eBay are a popular target for ____ .

Internet fraud

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording