


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Class: CS - Computer Architecture & Assembly Programming; Subject: Computer Science; University: Tyler Junior College; Term: Forever 1989;
Typology: Quizzes
1 / 4
This page cannot be seen from the preview
Don't miss anything!
Which act restricts what information the federal government can collect? The Privacy Act TERM 2 What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? DEFINITION 2 Spyware TERM 3 How do prevention and resistance technologies stop intruders from accessing and reading sensitive information? DEFINITION 3 Content filtering, encryption, and firewalls TERM 4 What is the method or system of government for information management or control? DEFINITION 4 Information governance TERM 5 What is one of the major problems with email? DEFINITION 5 User's expectation of privacy
What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user? Adware TERM 7 Which of the below represents the definition of information compliance? DEFINITION 7 The act of conforming, acquiescing, or yieldinginformation. TERM 8 Who are hackers with criminal intent? DEFINITION 8 Crakcers TERM 9 All of the following are types of information security breaches except: DEFINITION 9 E-discovery TERM 10 A DDoS stands for one of the common forms of viruses, that attacks multiple computers to flood a website until it slows or crashes. What does DDoS stand for? DEFINITION 10 Distributed denial-of-service attack
White-hat hacker Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen? TERM 17 Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware? DEFINITION 17 Antivirus software