Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Your roommate is complaining about sore eyes and blurred vision after prolonged computer use. What computer-related disorder may she have

Which of the following statements is not true about protecting yourself against computer viruses?

If a trusted source sends you an e-mail with an attachment you are not expecting, it is safe to open it because you know the sender.

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

Which of the following best describes the term, cybercrime?

online or Internet-based illegal acts

a series of distorted characters that a user is required to enter correctly to continue using a Web site

Which vendor is the world’s largest dedicated security technology company?

The term, PIN, is an acronym for which of the following?

personal identification numbe

Which of the following terms is used to describe an encrypted code that a person, Web site, or organization uses to verify the identity of the message sender?

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

What is an EULA intended to do?

license software for individual use

If an antivirus program cannot remove an infection, it often does which of the following?

It quarantines the infected file.

Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Which of the following terms is used to describe a program that hides within or looks like a legitimate program?

Define the term firewall.

hardware and/or software that protects a network’s resources from intrusion

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Which of the following protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files?

Tendonitis is an example of what type of computer-related disorder?

Which of the following is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints?

Which of the following statements is not true about intellectual property rights?

The term fair use specifies how material may be used and helps to define intellectual property rights.

Which of the following terms is used to describe a scam in which a perpetrator attempts to obtain your personal and financial information via spoofing?

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

Which of the following terms is used to describe a security measure that defines who can use a computer, when they can use it, and what actions they can take while using it?

Define the term payload, as it pertains to computer crime.

the destructive event or prank the program is intended to deliver

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

Which of the following statements is not true about hardware theft and vandalism?

Because of their weight and size, notebook computers are easy to conceal or secure, making them less vulnerable to theft.

Which of the following terms is used to describe a scam in which a Web site includes a button, image or link that contains a malicious program?

When an antivirus program cannot remove an infection from a file, it moves the file to a separate area of the hard disk until the infection can be removed. What is this area called?

You set up your computer so that your elbows are at about 90 degrees and your viewing distance is 18 to 28 inches. What scientific principle are you using to ensure your comfort and safety while using the computer?

Which of the following statements is not true about biometric devices?

With a touch screen, biometric payment can be used to make purchases over the Internet

Which of the following statements is not true about wireless security?

WPA is the most recent network security standard and is more sophisticated than 802.11i.

As shown in the accompanying figure, many Web sites require a user to enter a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. What is the term for this combination of characters?

Which of the following is someone who uses e-mail as a vehicle for extortion?

Which of the following terms is used to describe a small text file that a Web server stores on your computer?

Which of the following is the process of restricting access to certain material on the Web group of answer choices?

Content filtering is a process involving the use of software or hardware to screen and/or restrict access to objectionable email, webpages, executables and other suspicious items.

What is the term for a website that uses encryption techniques to protect its data?

What is the term for a website that uses encryption techniques to protect its data? Secure site.

Which term is used to describe software used by cyber criminals?

Malware, short for “malicious software,” refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.

Is hardware and or software that protects a network's resources from intrusion?

A firewall is hardware and/or software that is used to protect a computer or private network resources from intruders or hackers who might try to break into those systems. Basically, a firewall filters all network packets to determine whether to forward them toward their destination.