Chap#06 Security, Copyright & Law Flashcards
The method in which unauthorized access is prevented by providing a key, badge, token or a plastic card to authorized users is called:
What you are
Which of the following statements is true:
➡A password is a secret code consisting of words, numbers, or a combination of words and numbers.
➡A password must be entered to get access to a password-protected system
➡Only those persons who know the password can access a password-protected system
Which of the following is the most serious problem?
Loss of data
A removable media may be a:
➡CD or DVD
➡Flash Memory
➡Floppy Disk
The virus attach itself to file(s) which have the extension:
➡.exe
➡.dll
➡.com
WHich of the following virus deletes all Microsoft Office files and all the partition information from the disk?
Chernobyl
The virus, written in visual Basic script, locates folders .htt and infects it is called:
Redlof
Which of the following statements is correct?
a virus cannot read Pin code or Credit card number
Which of the following is the name of an anti-virus?
Dr. Solomon’s Toolkit
The act intended to protect individuals fro unauthorized use and disclosure of personal information held on a computer system is:
Privacy Protection Act
The Matching and Privacy Protection Act was introduced in:
1988
Making illegal copies of copyrighted software is called:
➡Theft
➡Piracy
FAST stands for:
Federation against software theft
A software used for data compression is called:
Winzip
Another name for antivirus is:
Vaccine