Create an account
An individual who illegally downloads copyrighted-protected software is referred to as a ____.
information security is implemented at the individual machine level, the computer network level, and the ____ level.
through the use of ____, data is secured when it is stored and transported over a network.
businesses prefer to use technology known as ____ to create an exact copy of their files for backup.
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
the job of the ____ administrator is to control who has access to various network resources such as files and folders.
you enter the wrong GPS position for the start point on a trip you are about to take: this is an example of ____.
a data entry error
People's mistakes can lead t problems with ____ of computer systems and information.
businesses are working to control information ____ by not allowing employees to store important data on their laptop computers.
stolen information can be used by all of the following EXCEPT ____ .
government agencies to garnish wages
corporate network administrators have the right to do all of the following EXCEPT ____ .
install a web cam in an employee's home
when starting a new job, you may need to sign a ____ that defines acceptable and unacceptable uses of computer and network resources.
network usage policy
to protect your wireless devices and the information they hold, you should set up your ____ to only connect to the SSIDs of your computers.
which of the following is NOT a realistic way to ensure Internet security?
Avoid client/server networks
in a practice called ____ ,someone may manipulate people into performing actions of divulging confidential information on the Internet.
an important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
a ____ allows hackers to gain access to important code or information in a software program.
software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
criminals collect items such as credit card numbers without the knowledge of the user through the use of ____ .
in a distributed denial-of-service (DDoS) attack, the services of a ____ can be halted.
The ____ was established to secure and monitor security risks to the U.S. networks and the internet.
you can protect yourself from identity theft by using ____ when transmitting information over the network connections.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together