MIS FINAL- chapter 5
Malware, short for malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices.
True
Which of the following is NOT an example of a digital security risk?
slacker
Which of the following is an example of software theft?
All of the above
An attach that disrupts computer access to Internet services and often results in entire networks being knocked offlline is known as which of the following?
Denial of service (DoS)
The discovery, collection and analysis of evidence found on computers and networks is known as which of the following?
Digital forensics
An event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability is known as which of the following?
Digital security risk
The process of converting data that is readable by humans into encoded characters to prevent unauthorized access is known as which of the following?
Encryption
Unauthorized access is the use of a computer or its data for unapproved or possibly illegal activities
False
Hardware and/or software that protects a network's resources from intrustion is known as which of the following?
Firewall
Reducing the electricity and environmental waste while using computers, mobile devices and related technologies is known as which of the following?
Green computing