Chapter 12, Practice Quiz 1

Chapter 12, Practice Quiz 1 - 1) When unauthorized programs...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Sheet1 Page 1 1) When unauthorized programs invade a computer system and replace legitimate programs, __________ occurs. (1point) spoofing snuffing data drowning usurpation Score: 0 Answer(s): usurpation 2) When someone inadvertently releases data in violation of policy, (1point) unauthorized data disclosure can occur. the employment of that person should be terminated. data will have to be rewritten and encrypted. policies will need to be amended. Score: 0 Answer(s): unauthorized data disclosure can occur. 3) Balancing the costs and benefits of the security program is the function of the IT department. (1point)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Sheet1 Page 2 Score: 0 Answer(s): False 4) _____________ are protections against security threats. (1point) Safeguards Vigilante programs Security flags Backup data Score: 1 Answer(s): Safeguards 5) Spyware resides in the background and, unknown to the user, observes the user's actions and keystrokes, monitors compu Score: 1 Answer(s): True 6) Encryption and firewalls are very important technical safeguards. (1point)
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/23/2010 for the course COMP SCI 1032 taught by Professor Goldstein during the Winter '10 term at UWO.

Page1 / 6

Chapter 12, Practice Quiz 1 - 1) When unauthorized programs...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online