Chap#06 Security, Copyright & Law Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

The method in which unauthorized access is prevented by providing a key, badge, token or a plastic card to authorized users is called:

A

What you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements is true:

A

➡A password is a secret code consisting of words, numbers, or a combination of words and numbers.
➡A password must be entered to get access to a password-protected system
➡Only those persons who know the password can access a password-protected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the most serious problem?

A

Loss of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A removable media may be a:

A

➡CD or DVD
➡Flash Memory
➡Floppy Disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The virus attach itself to file(s) which have the extension:

A

➡.exe
➡.dll
➡.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHich of the following virus deletes all Microsoft Office files and all the partition information from the disk?

A

Chernobyl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The virus, written in visual Basic script, locates folders .htt and infects it is called:

A

Redlof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following statements is correct?

A

a virus cannot read Pin code or Credit card number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the name of an anti-virus?

A

Dr. Solomon’s Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The act intended to protect individuals fro unauthorized use and disclosure of personal information held on a computer system is:

A

Privacy Protection Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Matching and Privacy Protection Act was introduced in:

A

1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Making illegal copies of copyrighted software is called:

A

➡Theft
➡Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FAST stands for:

A

Federation against software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A software used for data compression is called:

A

Winzip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Another name for antivirus is:

A

Vaccine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most common computer crime?

A

Software Piracy

17
Q

Accidental data loss may be prevented by using a (n) :

A

UPS

18
Q

There can be a complete backup of data or a(n) _____ backup of data.

A

Incremental

19
Q

A computer cannot get a virus:

A

Through a virus infected person

20
Q

A spare copy of data on a secondary storage is called:

A

Backup

21
Q

The software that is available free of cost is called:

A

Freeware

22
Q

A program that performs a useful task and at the same time carries out some destructive act is called:

A

Sabotage