MIS FINAL- chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Malware, short for malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices.

True

Which of the following is NOT an example of a digital security risk?

slacker

Which of the following is an example of software theft?

All of the above

An attach that disrupts computer access to Internet services and often results in entire networks being knocked offlline is known as which of the following?

Denial of service (DoS)

The discovery, collection and analysis of evidence found on computers and networks is known as which of the following?

Digital forensics

An event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability is known as which of the following?

Digital security risk

The process of converting data that is readable by humans into encoded characters to prevent unauthorized access is known as which of the following?

Encryption

Unauthorized access is the use of a computer or its data for unapproved or possibly illegal activities

False

Hardware and/or software that protects a network's resources from intrustion is known as which of the following?

Firewall

Reducing the electricity and environmental waste while using computers, mobile devices and related technologies is known as which of the following?

Green computing


Ensembles d'études connexes

Lokalisatie meridianen (bl, ni, pc, 3w, gb, le)

View Set

Retirement and Other Insurance Concepts

View Set

BUS 226- Chapter 12: Performance and Breach of Sales and Lease Contracts

View Set

Praxis Basic Skills for Educators - (5751): Reading & Writing

View Set

psychology chapter 9: lifespan and development

View Set

Amphipathic Molecules: Components of Blood

View Set

Independent variable, Chemistry of Life (Chapter 1 and 2)

View Set