{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Concepts Chapter 6 - Information Security Test Introduction to Computers-COSC-1401-4015-2011 Fall

Concepts Chapter 6 - Information Security Test Introduction to Computers-COSC-1401-4015-2011 Fall

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1. To protect your wireless devices and the information they hold, you should make sure that Bluetooth is set so that it is not ____ to others. A) Enabled B) Visible C) Auto-connected D) Permissible 2. Stolen information can be used by all of the following EXCEPT ____. A) unethical businesses to gain an advantage in a competitive market B) hackers to illegally access computer accounts C) government agencies to garnish wages D) spammers to target advertisements at consumers 3. In the criminal act of pharming, hackers hijack a Domain Name Server to automatically redirect users from legitimate Web sites to spoofed Web sites in an effort to steal personal information. A) False B) True 4. Once installed, antivirus software is effective for the life of the computer. A) False B) True 5. In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet. A) packet sniffing B) port scanning C) dumpster diving Points Awarded 19.00 Points Missed 1.00 Percentage 95.0% Points Earned: 1.0/1.0 Correct Answer(s): B Points Earned: 1.0/1.0
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}