IT MID CHAP 5
問題一覧
1
Digital security risk
2
computer crime
3
cybercrime
4
Hacker Cracker Script kiddie Corporate spies Unethical employees Cyberextortionist Cyberterrorist
5
Malware
6
Virus Worm Trojan Horse Rootkit Spyware Adware
7
botnet
8
zombie
9
denial of service attack (DoS attack)
10
back door
11
Spoofing
12
firewall
13
Unauthorized access
14
several methods
15
Acceptable use policy Disable file and printer sharing
16
Access controls
17
– User name – Password
18
passphrase
19
PIN (Personal Identification Number)
20
biometric device
21
Fingerprint reader Face recognition system Hand geometry system Voice verification system Signature verification system Iris recognition system
22
Two-step verification
23
Digital forensics
24
Law enforcement Criminal prosecutors Military intelligence Insurance agencies Information security departments
25
Software theft
26
product activation
27
license agreement
28
Information theft
29
Encryption
30
digital signature
31
digital certificate
32
secure site
33
Hardware theft
34
Hardware vandalism
35
backup
36
To back up
37
– Full – Differential – Incremental – Selective – Continuous data protection – Cloud
38
*refer to image
39
TRUE
40
Technology ethics
41
Information accuracy is a concern
42
Intellectual property
43
Intellectual property rights
44
copyright
45
Digital rights management (DRM)
46
code of conduct
47
Green computing
48
Information privacy
49
TRUE
50
– Fill out a printed or online form – Create a profile on an online social network – Register a product warranty
51
cookie
52
Allow for personalization Store user names and/or passwords Assist with online shopping Track how often users visit a site Target advertisements
53
Phishing
54
clickjacking
55
Spyware
56
Adware
57
Social engineering
58
Employee monitoring
59
TRUE
60
TRUE
61
Content filtering
62
Web filtering software
63
Common type of Malware
STS CHAP 6 n 7
STS CHAP 6 n 7
Irina Kayla Rottey · 36問 · 2年前STS CHAP 6 n 7
STS CHAP 6 n 7
36問 • 2年前STS CHAP 8
STS CHAP 8
Irina Kayla Rottey · 32問 · 2年前STS CHAP 8
STS CHAP 8
32問 • 2年前HPC CHAP 3
HPC CHAP 3
Irina Kayla Rottey · 16問 · 2年前HPC CHAP 3
HPC CHAP 3
16問 • 2年前HPC CHAP 5
HPC CHAP 5
Irina Kayla Rottey · 33問 · 2年前HPC CHAP 5
HPC CHAP 5
33問 • 2年前FO
FO
Irina Kayla Rottey · 21問 · 2年前FO
FO
21問 • 2年前HK 1
HK 1
Irina Kayla Rottey · 32問 · 2年前HK 1
HK 1
32問 • 2年前HK 2
HK 2
Irina Kayla Rottey · 61問 · 2年前HK 2
HK 2
61問 • 2年前Legal 3
Legal 3
Irina Kayla Rottey · 30問 · 1年前Legal 3
Legal 3
30問 • 1年前..
..
Irina Kayla Rottey · 37問 · 1年前..
..
37問 • 1年前問題一覧
1
Digital security risk
2
computer crime
3
cybercrime
4
Hacker Cracker Script kiddie Corporate spies Unethical employees Cyberextortionist Cyberterrorist
5
Malware
6
Virus Worm Trojan Horse Rootkit Spyware Adware
7
botnet
8
zombie
9
denial of service attack (DoS attack)
10
back door
11
Spoofing
12
firewall
13
Unauthorized access
14
several methods
15
Acceptable use policy Disable file and printer sharing
16
Access controls
17
– User name – Password
18
passphrase
19
PIN (Personal Identification Number)
20
biometric device
21
Fingerprint reader Face recognition system Hand geometry system Voice verification system Signature verification system Iris recognition system
22
Two-step verification
23
Digital forensics
24
Law enforcement Criminal prosecutors Military intelligence Insurance agencies Information security departments
25
Software theft
26
product activation
27
license agreement
28
Information theft
29
Encryption
30
digital signature
31
digital certificate
32
secure site
33
Hardware theft
34
Hardware vandalism
35
backup
36
To back up
37
– Full – Differential – Incremental – Selective – Continuous data protection – Cloud
38
*refer to image
39
TRUE
40
Technology ethics
41
Information accuracy is a concern
42
Intellectual property
43
Intellectual property rights
44
copyright
45
Digital rights management (DRM)
46
code of conduct
47
Green computing
48
Information privacy
49
TRUE
50
– Fill out a printed or online form – Create a profile on an online social network – Register a product warranty
51
cookie
52
Allow for personalization Store user names and/or passwords Assist with online shopping Track how often users visit a site Target advertisements
53
Phishing
54
clickjacking
55
Spyware
56
Adware
57
Social engineering
58
Employee monitoring
59
TRUE
60
TRUE
61
Content filtering
62
Web filtering software
63
Common type of Malware