Major 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following are common methods of indirect tracking? More than one answer may be selected.

A cookie tracks your browser activity after you click on an ad in your Facebook newsfeed. Amazon tracks what products you view and what you actually purchase after clicking on an affiliate link from a blog.

Which of the following statements describe Internet robots, or bots? More than one answer may be correct.

Bots are used for both legitimate and malicious purposes. Malicious bots can compromise a user's control of the computer. "Good bots" have useful functions and do not pose security risks. Malicious bots have decreased in number and scope in the past few years.

It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of

Distributive Justice

The U.S. Constitution specifically protects freedom of speech from government censorship through the

First Amendment.

Which of the following are true about protecting big data? More than one answer may be selected.

Human error causes the majority of data breaches. An advantage of cloud storage is that it reduces the potential for human error. A data breach can cause a company great expense.

Which of the following is true of structured data? More than one answer may be selected.

It has a defined length, type, and format. It can include numbers and dates. It is designed for input into databases.

Describe qualifications necessary to obtain a patent on an invention. More than one answer may be correct.

To qualify for a patent, the invention must be novel, or different, from other similar inventions. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. A patent will only be granted for something that is useful.

Describe privacy concerns associated with cookies. More than one answer may be correct.

Websites that use cookies can collect information about surfing habits and sell that information to a variety of third parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.

Data at rest or storage can be found in which of the following places? More than one answer may be correct.

a database in a datacenter data being transferred via a USB cord rather than a Wi-Fi network

Which of the following are true about privacy protection techniques? More than one answer may be selected.

antivirus software uses a variety of techniques to identify and remove viruses and malware a virtual private network (VPN) hides your IP address by running communications through a secure network credit monitoring includes watching your monthly bills to look for fraudulent charges

Which of the following determines the interest rate you'll be charged when you want to borrow money?

credit report

Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device.

cryptocurrency

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?

distributing company-owned software without authorization

Living a virtuous life involves acting with high morals that are logically defined or shaped by

ethics.

Ransomware basically holds a target hostage because it

makes the target's own data inaccessible.

How have businesses reduced the likelihood of experiencing a data breach?

moving data storage to a cloud service provider such as Amazon Web Services

A checkbox may ask if you want to receive news and updates or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an

opt-in and opt-out.

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet

privacy

The Act that specifically requires all pornographic sites to include some sort of age verification is

the Children's Internet Protection Act of 2000 (CIPA).

Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved?

the Universalist Principle

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ________ cookies.

third-party

What is a company that purchases consumer behavior information from other organizations engaged in?

third-party data purchase

What is the goal of the NIST Cybersecurity Framework Protect (PR) function?

to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

What are the two major types of patents?

utility design


Ensembles d'études connexes

chapter 48: Nursing care of the child with an alteration in metabolism/endocrine disorder:

View Set

MedSurg PrepU Ch 34 Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set

Ch. 2- Designing a Healthful Diet

View Set