Concepts Chapter 6 - Information Security Test Introduction to Computers-COSC-1401-4015-2011 Fall

Concepts Chapter 6 - Information Security Test Introduction to Computers-COSC-1401-4015-2011 Fall

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1. To protect your wireless devices and the information they hold, you should make sure that Bluetooth is set so that it is not ____ to others. A) Enabled B) Visible C) Auto-connected D) Permissible 2. Stolen information can be used by all of the following EXCEPT ____. A) unethical businesses to gain an advantage in a competitive market B) hackers to illegally access computer accounts C) government agencies to garnish wages D) spammers to target advertisements at consumers 3. In the criminal act of pharming, hackers hijack a Domain Name Server to automatically redirect users from legitimate Web sites to spoofed Web sites in an effort to steal personal information. A) False B) True 4. Once installed, antivirus software is effective for the life of the computer. A) False B) True 5. In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet. A) packet sniffing B) port scanning C) dumpster diving Points Missed 1.00 Percentage 95.0% Points Earned: 1.0/1.0 Correct Answer(s): B Points Earned: 1.0/1.0 Correct Answer(s): C
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

Concepts Chapter 6 - Information Security Test Introduction to Computers-COSC-1401-4015-2011 Fall

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online