100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

BCIS 2610 FINAL EXAM QUESTIONS & ANSWERS

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
10-01-2026
Written in
2025/2026

BCIS 2610 FINAL EXAM QUESTIONS & ANSWERS

Institution
BCIS 2610
Course
BCIS 2610










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
BCIS 2610
Course
BCIS 2610

Document information

Uploaded on
January 10, 2026
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

BCIS 2610 FINAL EXAM QUESTIONS & ANSWERS

Computer crime is sometimes referred to as - Answers -cybercrime

To explain acceptable computer use to their employees, students, or other users, many
organizations and educational institutions publish guidelines for behavior, often called -
Answers -codes of conduct

_______ refers to the act of breaking into a computer or network - Answers -hacking

According to a recent study, the total cost per data breach in _______ is $5.4 million----
the highest of any country. - Answers -the United States

Advocates of ______ state that, unless individuals or businesses protect their access
points, they are welcoming others to use them - Answers -war driving

The term ______ refers to accessing someone else's unsecured Wi-Fi network from the
hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot
location, or near a local business) - Answers -Wi-Fi piggybacking

_________, the most commonly used type of possessed knowledge, are secret words
or character combinations associated with an individual - Answers -passwords

_________ access systems use physical objects for this identification purposes and
they are frequently used to control access to facilities and computer systems - Answers
-possessed object

Increasingly, USB security keys, also called USB security ________---- USB flash
drives that are inserted into a computer to grant access to a network, to supply Web site
usernames and passwords, or to provide other security features---- are being used -
Answers -tokens

______ identify users by a particular unique biological characteristic - Answers -
biometric access systems

A ________ is a security system that essentially creates a wall between a computer or
network and the Internet in order to protect against unauthorized access - Answers -
firewall

_____ uses a single secret key to both encrypt and decrypt the file or message -
Answers -Asymmetric Key Encryption

Some Web-based encrypted e-mail systems-----such as the popular free ______
service---- require both the sender and recipient to have accounts through that system -
Answers -Hushmail

,A _______ provides a secure private tunnel from the user's computer through the
Internet to another destination and is most often used to provide remote employees with
secure access to a company network - Answers -virtual private network

______ software can control which devices can be connected to an employee's
computer - Answers -Professional firewall

_______ includes any acts of malicious destruction to a computer or computer resource
- Answers -computer sabotage

A computer that is controlled by a hacker or other computer criminal is referred to as a -
Answers -bot

_______ is a generic term that refers to any type of malicious software - Answers -
malware

A computer _____ is a software program that is installed without the permission or
knowledge of the computer user, that is designed to alter the way a computer operates,
and that can replicate itself to infect any new media it has access to - Answers -virus

Like a computer virus, a _______ is a malicious program designed to cause damage -
Answers -computer worm

A _______ is a malicious program that masquerades as something else----usually as
some type of application program - Answers -Trojan horse

A computer _____ spreads by creating copies of its code and sending those copies to
other computers via a network - Answers -worm

One emerging type of Trojan horse is called _____-Access Trojan - Answers -remote

Antivirus programs are usually set up to automatically download new ____ from their
associated Web site on a regular basis - Answers -threat definitions

A booming area of computer crime involves online fraud, theft, scams, and related
activities collectively referred to as - Answers -dot cons

______ occurs when someone obtains enough information about a person to be able to
masquerade as that person for a variety of activities----usually to buy products or
services in that person's name - Answers -identity theft

_______ can be extremely distressing for victims, can take years to straighten out, and
can be very expensive - Answers -identity theft

, Phishing schemes may use a technique called ______, which is setting up spoofed
Web sties with addresses slightly different from legitimate sites - Answers -
typosquatting

______ is a type of scam that uses spoofed domain names to obtain personal
information for use in fraudulent activities - Answers -pharming

the best protection from many dot cons is - Answers -common sense

When a digitally signed document is received, the recipient's computer uses the
sender's ____ key to verify the digital signature - Answers -public

The green color of the Address bar in the accompanying figure indicates that the site is
using a valid ____ SSL certificate - Answers -EV

repeated threats or other harassment carried out online between adults is referred to as
- Answers -cyberstalking

The ______, implemented in 2001, grants federal authorities expanded surveillance and
intelligence-gathering powers, such as broadening their ability to obtain the real identity
of Internet users and to intercept Internet communications - Answers -USA Patriot Act

The ______ includes provisions to combat cyberterrorism, including protecting ISPs
against lawsuits from customers for revealing private information to law enforcement
agencies - Answers -Homeland Security Act of 2002

Our networked society has raised a number of ___ concerns - Answers -privacy

New security risks are revealed all the time. For instance, it was recently discovered
that data from some unencrypted smart meters can be accessed from nearly _____
away, enabling would-be burglars to monitor homes to see if they are occupied based
on electricity usage within the homes. - Answers -1,000 feet

Although many of us may prefer not to think about it, ____---- the complete malfunction
of a computer system---- and other types of computer-related disasters do happen. -
Answers -system failure

To facilitate using a computer lock, nearly all computers today come with a _____----a
small opening built into the system unit case designed for computer locks. - Answers -
security slot

____ can be used to secure portable computers, external hard drives, and other
portable pieces of hardware to a table or other object. - Answers -Cable locks

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Greaterheights Birkbeck, University of London
View profile
Follow You need to be logged in order to follow users or courses
Sold
1126
Member since
3 year
Number of followers
880
Documents
18641
Last sold
2 days ago

4.1

218 reviews

5
120
4
43
3
24
2
10
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions