Site MapHelpFeedbackMultiple Choice Quiz 2
Multiple Choice Quiz 2
(See related pages)

1
Which of the three privacy issues relates to the responsibility of those who have data to control who is able to use that data?
A)access
B)accuracy
C)property
D)security
2
What is the illegal assumption of someone's identity for the purposes of economic gain called?
A)fraud
B)identity theft
C)monitory transgression
D)scamming
3
These cookies record your activities across different sites.
A)tracking
B)traditional
C)Web bug
D)first-party
4
These programs record every activity and keystroke made on a computer system.
A)computer monitoring software
B)Web bug
C)virus
D)worm
5
Individuals who gain unauthorized access to your computer or computers that contain information about others:
A)hackers
B)cryptographers
C)encoders
D)crackers
6
This special type of virus fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped.
A)firewall
B)keystroke
C)worm
D)zombie
7
This type of attack attempts to slow down or stop a computer system or network by flooding it with requests for information and data.
A)cracker
B)denial of service
C)hacker
D)Trojan horse
8
This type of attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A)denial of service
B)password
C)dictionary
D)virus
9
One of the best-known wireless encryption protocols is:
A)DRM
B)HIPAA
C)VPN
D)WPA2
10
The unauthorized copying and distribution of software is called:
A)cracking
B)hacking
C)plagiarism
D)software piracy







OLearyCE, 25e Online Learning Center

Home > Chapter 9 > Multiple Choice Quiz 2