BCIS 2610 EXAM 3 UNT QUESTIONS AND ANSWERS 100% PASS
BCIS 2610 EXAM 3 UNT QUESTIONS AND ANSWERS 100% PASS Sending an e-mail that looks like it came from someone else in order to obtain information for fraudulent purposes is called ____. phishing True or False: Most spyware is installed on a PC without the user's knowledge True Using someone else's identity to purchase goods or services or perform other transactions is called ____ Identity Theft You can find out if someone else has signed up for a credit card in your name by viewing your ____. credit report True or False: A digital signature is used to encrypt the contents of an email message so it cannot be understood if intercepted False Digital certificates are obtained from a(n) ____. Certificate Authority Repeated threats or other harassment carried out online is referred to as ____ Cyberstalking True or False: Cyberstalkers often find their victims online True Bullying an individual online is typically referred to as ____ Cyberbullying Which of the following is not a common-sense precaution against cyberstalking? Monitoring your credit report True or False: "Bikinigirl" would be a good name to avoid attracting unwanted attention in a chat room False ____ occurs when someone sees a teen's explicit photo in a text message or on the Internet and threatens to expose the teen's behavior unless the teen sends more explicit photos Sextortion Which of the following laws refers to protecting health information stored electronically? HIPAA True or False: It is virtually impossible to create laws that cover network and Internet security issues today False The ____ Act requires archiving a variety of electronic records and protecting the integrity of corporate financial data SarbanesOxley Which of the following is not a possible computer security concern? Sending a non-sensitive file via e-mail True or False: All individuals should be concerned about security issues surrounding computers and related technology True Safeguarding a PC against theft and backing up files so that you do not lose important documents are all computer _____ concerns Security Which of the following would not likely be a reason for stealing a notebook PC? To use in a denial of service (DoS) attack True or False: It is only important to use a surge suppressor during bad weather, when a lightning strike may occur False A copy of a file that is created in case the original is damaged is called a(n) Backup Using a computer to make illegal copies of currency to circulate as real currency is a form of ____. digital counterfeiting True or False: Software piracy is rarely performed today False is the unauthorized copying of a computer program Software piracy Which of the following is a possible result of a data breach
Written for
- Institution
- BCIS 2610
- Course
- BCIS 2610
Document information
- Uploaded on
- October 2, 2023
- Number of pages
- 17
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
bcis 2610 exam 3 unt questions and answers 100 pa
Also available in package deal